Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?
Which of the following types of controls focuses on stopping a security breach from taking place in the ?rst place?
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve exploiting any security vulnerability?
Fill in the blank: An______(AS) is a group of networks under a single administration and with single routing policies.