Which of the following allows an administrator to view malicious activity after it has taken place?
A. IDS
B. IPS
C. Port scanner
D. Packet sniffer
Answer: A. IDS
Computer Science & Information Technology
You might also like to view...
Empty areas on a Web page are called white space
Indicate whether the statement is true or false
Computer Science & Information Technology
What will be displayed after the following program segment is coded and run, assuming the user enters the number 49 at the prompt?
``` Write “Enter a number.”. Write “This program will display its square root.”. Input Number Write “The square root of “+Number+“ is “+Sqrt(Number)+“.”.``` a. The square root of 7 is 49. b. The square root of Number is 7. c. The square root of 49 is 7. d. An error message
Computer Science & Information Technology