Which of the following systems detects and reports attempts of unauthorized access to the network?

A. Host based firewall
B. Basic firewall
C. IDS
D. IPS

Answer: C. IDS

Computer Science & Information Technology

You might also like to view...

________ is the rules for acceptable behavior and manners on the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

A crosstab query requires only a field for a row heading and a field for a column heading

Indicate whether the statement is true or false

Computer Science & Information Technology