Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
A. prevention
B. reaction
C. detection
D. correction
Answer: D
Computer Science & Information Technology
You might also like to view...
______ enables the reuse of existing classes.
a) Encapsulation b) Inheritance c) Polymorphism d) Simulation
Computer Science & Information Technology
The Object class contains the method:
(a) getClass() (b) toString() (c) equals() (d) all of the above
Computer Science & Information Technology