A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
A. host-based IDS
B. security intrusion
C. network-based IDS
D. intrusion detection
C. network-based IDS
Computer Science & Information Technology
You might also like to view...
Descriptive data or labels placed in the Report Header will be shown at the top of the ________ of a printed report
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ bar can be used to enter and edit content
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology