Which of the following can be used to detect system breaches and alert a system administrator?
a. IDS
b. Firewall
c. NAT
d. Proxy
ANS: A
Computer Science & Information Technology
You might also like to view...
The ________ feature is used to resize columns by double-clicking the border between the two columns is called
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following does NOT require constant refreshing?
A) DRAM B) SDRAM C) EDO RAM D) SRAM
Computer Science & Information Technology