____ applications use a combination of techniques to detect an intrusion and trace it back to its source.
A. Trap-and-trace applications
B. Honeynet
C. Behavior-based
D. Statistical anomaly-based
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following is not a function of a utility provided by an operating system?
A. copying files B. listing files C. printing files D. translating C++ programs
Computer Science & Information Technology
The query engine is the component of the architecture that optimizes and manages queries and SQL statements.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology