Multiple Choice
A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) .
A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) virtual private network
Correct Answer:

Verified
Correct Answer:
Verified
Q23: A spear phishing attack typically employs a
Q26: In computing, a(n) is a term for
Q28: The USA Patriot Act defines cyberterrorism as
Q29: The security of any system or network
Q29: Rootkit is a set of programs that
Q31: is the abuse of email systems to
Q32: To initiate a denialofservice attack, a tiny
Q33: A attack keeps the target so busy
Q34: A strong security program begins by .<br>A)
Q35: Often a successful attack on an information