Multiple Choice
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
A) prevention
B) reaction
C) detection
D) correction
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q71: Network behavior analysis system _ sensors are
Q72: The Simple Network Management Protocol contains trap
Q73: The primary advantages of a centralized IDPS
Q74: HIDPSs are also known as system _
Q75: A false positive is the failure of
Q77: To determine whether an attack has occurred
Q78: A(n) _ IDPS can adapt its reactions
Q79: A(n) _ IDPS is focused on protecting
Q80: For Linux or BSD systems, a tool
Q81: Alarm _ and compaction is a consolidation