An intrusion detection system can perform all of the following functions except:
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
D
Business
You might also like to view...
________ classes control the flow of the application
A) Boundary B) Utility C) Control D) all of the above
Business
Three months before his 18th birthday, Martin bought a used motorcycle for $3,000 cash. Two years later Martin wanted to disaffirm the contract. May he legally do so?
Business