Which of the following is a process that detects a problem, determines its cause, minimizes the damages…?
Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices…?
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services…?
Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients?
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?