Short Answer
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Software that can react to suspicious activity.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: A(n) _ is a thorough examination of
Q12: Describe one potential flaw in CHAP and
Q13: In _, a hacker forges name server
Q14: Describe the three-way handshake used in CHAP.
Q16: _ is a social engineering practice in
Q22: _ is a public key encryption system
Q35: The use of certificate authorities to associate
Q40: A router that is not configured to
Q46: A _ attack occurs when an Internet
Q49: A _ attack occurs when a system