Which of the following monitors the network activity and identifies suspicious traffic and anomalies?
a. IDS
b. Firewall
c. Honeypot
d. Honeynet
ANS: A
Computer Science & Information Technology
You might also like to view...
You can choose to use range names in formulas that you create instead of cell references
Indicate whether the statement is true or false
Computer Science & Information Technology
The primary goal of _____ is to create a safe and healthy work environment
Fill in the blank(s) with correct word
Computer Science & Information Technology