Which of the following IDS techniques seeks to prevent intrusions before they occur?

a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring

ANS: B

Computer Science & Information Technology

You might also like to view...

When selecting contiguous files, you press and hold the ________ key while clicking the top and bottom files

A) Alt B) Windows C) Ctrl D) Shift

Computer Science & Information Technology

Which of the following is information that is unlikely to result in a high-level financial loss or serious damage to the organization but still should be protected?

a. Private data b. Public data c. Confidential data d. Sensitive data

Computer Science & Information Technology