Which of the following can be used to detect system breaches and alert a system administrator?
A) IDS
B) Firewall
C) NAT
D) Proxy
A) IDS
Computer Science & Information Technology
You might also like to view...
A(n) ________ on a worksheet tab indicates that a worksheet is either active or selected within a group
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following cannot be an enum’s underlying type?
a) sbyte b) int c) ulong d) double
Computer Science & Information Technology