________ are applications designed to detect,log,and respond to unauthorized A.network or host use,both in real time and after the fact
A) Windows Operating System
B) Intrusion detection systems (IDS)
C) Firewalls
D) Twisted wire pairs
Correct Answer:
Verified
Q3: Centralized monitoring of the health of the
Q4: _ are types of magnetic media.
A)CDR,CDRW,DVD
B)Linux,Windows,Oracle
C)Hard drives,diskettes,tape
D)Keyboards,mouse,monitor
Q5: Media can be divided into three categories:
A)Paper,plastic,cloth
B)Magnetic,optical,and
Q6: _ media store data through the rearrangement
Q7: You are building a network and need
Q9: Which of the following is an extension
Q10: You are building a small network in
Q11: What protocol is used to manage IP
Q12: Which operating system is immune to virus
Q13: You are building a network and need
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents