Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?
A. sending DoS packets to the source
B. terminating the network connection
C. reconfiguring network devices
D. changing the attack's content
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following do NOT make VBA code easy to read?
A) Paragraphs B) Comments C) Line breaks D) Indentations
Computer Science & Information Technology
What type of programs specifically manage central processor and computer memory?
A. batch managers B. application program interfaces C. task-switching D. resource managers
Computer Science & Information Technology