An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.
Correct Answer:
Verified
Q46: Pervasive control plans:
A) are unrelated to applications
Q47: Top 10 management concerns about IT's capability
Q48: Computer hacking and cracking is the intentional,
Q49: Intrusion-prevention systems (IPS) actively block unauthorized traffic
Q50: The department or function that develops and
Q52: The use of IT resources for enterprise
Q53: Threat monitoring is a technique to protect
Q54: COBIT was developed by:
A) COSO
B) IT Governance
Q55: Periodic cleaning, testing, and adjusting of computer
Q56: This IT function's key control concern is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents