Multiple Choice
This logs and monitors who is on or trying to access an organization's network.
A) biometrics
B) electronic vaulting
C) intrusion detection systems (IDS)
D) firewall
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q62: The user manual gives detailed instructions to
Q63: IT governance is a process that ensures
Q64: The system of controls used in this
Q65: When segregation of duties cannot be effectively
Q66: A mechanism by which a company is
Q68: A(n) _ uses many computers, called zombies,
Q69: _ is when a hacker calls and
Q70: In an information systems organizational structure, the
Q71: The _ function provides efficient and effective
Q72: Managing functional units such as networks, CAD/CAM