Which of the following allows an administrator to view malicious activity after it has taken place?

A. IDS
B. IPS
C. Port scanner
D. Packet sniffer

Answer: A. IDS

Computer Science & Information Technology

You might also like to view...

Empty areas on a Web page are called white space

Indicate whether the statement is true or false

Computer Science & Information Technology

What will be displayed after the following program segment is coded and run, assuming the user enters the number 49 at the prompt?

``` Write “Enter a number.”. Write “This program will display its square root.”. Input Number Write “The square root of “+Number+“ is “+Sqrt(Number)+“.”.``` a. The square root of 7 is 49. b. The square root of Number is 7. c. The square root of 49 is 7. d. An error message

Computer Science & Information Technology