Which of the following can be used to detect system breaches and alert a system administrator?

a. IDS
b. Firewall
c. NAT
d. Proxy

ANS: A

Computer Science & Information Technology

You might also like to view...

The ________ feature is used to resize columns by double-clicking the border between the two columns is called

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following does NOT require constant refreshing?

A) DRAM B) SDRAM C) EDO RAM D) SRAM

Computer Science & Information Technology