Which of the following systems detects and reports attempts of unauthorized access to the network?
A. Host based firewall
B. Basic firewall
C. IDS
D. IPS
Answer: C. IDS
Computer Science & Information Technology
You might also like to view...
________ is the rules for acceptable behavior and manners on the Internet
Fill in the blank(s) with correct word
Computer Science & Information Technology
A crosstab query requires only a field for a row heading and a field for a column heading
Indicate whether the statement is true or false
Computer Science & Information Technology