Which of the following IDS techniques seeks to prevent intrusions before they occur?
a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring
ANS: B
Computer Science & Information Technology
You might also like to view...
When selecting contiguous files, you press and hold the ________ key while clicking the top and bottom files
A) Alt B) Windows C) Ctrl D) Shift
Computer Science & Information Technology
Which of the following is information that is unlikely to result in a high-level financial loss or serious damage to the organization but still should be protected?
a. Private data b. Public data c. Confidential data d. Sensitive data
Computer Science & Information Technology