Multiple Choice
Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:
A) Security detection
B) Vulnerability assessment
C) Penetration testing
D) Intrusion detection
Correct Answer:

Verified
Correct Answer:
Verified
Q70: This item, that strengthens the use of
Q71: Hardware, software, or a combination of both
Q72: This encryption method requests connection to the
Q73: Many IT systems have redundant data storage
Q74: Internal controls used specifically in accounting applications
Q76: Internal controls that apply overall to the
Q77: All of the following are environmental control
Q78: This term relates to making the computer
Q79: This communication protocol is built into web
Q80: Internal controls that apply overall to the