Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?

A. sending DoS packets to the source
B. terminating the network connection
C. reconfiguring network devices
D. changing the attack's content

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following do NOT make VBA code easy to read?

A) Paragraphs B) Comments C) Line breaks D) Indentations

Computer Science & Information Technology

What type of programs specifically manage central processor and computer memory?

A. batch managers B. application program interfaces C. task-switching D. resource managers

Computer Science & Information Technology