1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
7

A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit

y personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

You might be interested in
PLEASE HELP!
lawyer [7]

To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

<h3>How do I stop pop-up links?</h3>

One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:

  • Click on Settings from the Chrome menu.
  • input 'pop' in the search bar.
  • Select Site Settings  and then select Pop-ups and redirects.
  • Here one can toggle the Pop-ups and redirections option to Blocked them.

Therefore, To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

Learn more about pop up link from

brainly.com/question/13666301

#SPJ1

4 0
1 year ago
Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
mina [271]

Answer:

The answer to this question is given below in the explanation section.

Explanation

Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely are:

  1. Linux
  2. OpenBSD
  3. FreeBSD
  4. NetBSD
  5. AROS
  6. Tock
  7. FreeDOS
  8. Dragonfly BSD
  9. Qubes OS
  10. Haiku
  11. Redox
  12. ReactOS
  13. Subgraph OS
  14. osv.io
  15. ToaruOS
  16. Mezzano
  17. House
  18. Minoca OS
  19. SOS
  20. PowerNex
  21. Interim OS
  22. KolibriOS
  23. MINIX
  24. HelenOS
  25. Sculpt
  26. Harvey
  27. illumos
  28. GeckOS/A65 V2.0
  29. Serenity
  30. GNU Hurd
  31. Plan 9
  32. AquilaOS
  33. Biscuit
  34. Xv6

These are the different opensource operating systems.

3 0
3 years ago
The algorithm for solving the problem of average of five (5) numbers​
PilotLPTM [1.2K]

Answer:

Explanation:

Denote the five numbers as a, b, c, d and e.

The average is:

(a + b + c + d +e) ÷ 5.

Easily:

Learn how to do input and output operations in your programming language of choice.

Learn what average is (see Arithmetic mean - Wikipedia)

Learn how to code arithmetic operations in your PL of choice.

Put all that together and code the program.

Oh, did you expect the code snippet? Sorry, I don’t do peoples’ homework for them on principle. Homework is for you to learn something. If you can’t be bothered, accept that you’ll fail your class. If you want to pass, LEARN.

3 0
2 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
Why did artists use pinhole cameras during the renaissance?
Dima020 [189]
Pinhole cameras were one of the most sophisticated devices of the period, it made tasks much easier it basically worked exactly like the human eye and is something just like tracing.
8 0
3 years ago
Other questions:
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    5·1 answer
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • A trojan horse
    12·1 answer
  • Which items may interfere with a wireless connection and may cause disruptions or delays in submitting assignments in blackboard
    9·2 answers
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
  • Discussion Topic
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!