A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

A. host-based IDS
B. security intrusion
C. network-based IDS
D. intrusion detection

C. network-based IDS

Computer Science & Information Technology

You might also like to view...

Descriptive data or labels placed in the Report Header will be shown at the top of the ________ of a printed report

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ bar can be used to enter and edit content

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology