____ applications use a combination of techniques to detect an intrusion and trace it back to its source.

A. Trap-and-trace applications
B. Honeynet
C. Behavior-based
D. Statistical anomaly-based

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is not a function of a utility provided by an operating system?

A. copying files B. listing files C. printing files D. translating C++ programs

Computer Science & Information Technology

The query engine is the component of the architecture that optimizes and manages queries and SQL statements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology