Short Answer
A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: Match each item with a statement below.<br>-Uses
Q5: _ is a vulnerability scanner that will
Q6: Match each item with a statement below.<br>-The
Q7: There are only two ways to help
Q8: A _ provides the rules and expectations
Q10: Match each item with a statement below.<br>-Examines
Q11: A _ is an alert given when
Q12: The most common approaches to password _
Q13: The _ technique tries all combinations of
Q14: Security policies and procedures should be static.