Identifying specific attempts to penetrate systems is the function of the _______________.
A.
Firewall
B.
Router
C.
Intrusion Detection System
D.
Vulnerability Scanner
E.
CERT – Computer Emergency Response Team
Identifying specific attempts to penetrate systems is the function of the _______________.
Identifying specific attempts to penetrate systems is the function of the _______________.
A.
Firewall
B.
Router
C.
Intrusion Detection System
D.
Vulnerability Scanner
E.
CERT – Computer Emergency Response Team