Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A. prevention
B. reaction
C. detection
D. correction

Answer: D

Computer Science & Information Technology

You might also like to view...

______ enables the reuse of existing classes.

a) Encapsulation b) Inheritance c) Polymorphism d) Simulation

Computer Science & Information Technology

The Object class contains the method:

(a) getClass() (b) toString() (c) equals() (d) all of the above

Computer Science & Information Technology