1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
4 years ago
7

A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit

y personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Computers and Technology
1 answer:
enyata [817]4 years ago
5 0

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

You might be interested in
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
An employment situation that pays bills but is largely unfilling is
Ilia_Sergeevich [38]

Answer:

Explanation:Any job that a person doesn't particularly like or enjoy.

7 0
3 years ago
When was Imagine dragons created
Eva8 [605]
They started at 2008                                            
5 0
3 years ago
Topic: Drivers ed 100 points and brainliest!
ddd [48]

Answer: Ill explain it!

Explanation: Modern technology is extremely beneficial to drivers because the modern cars have sensors that detect the range of other cars, when they stop and you might not see or be ready for it, your car will slam the brakes for you, this alone saves many lives. Another is like a Tesla with autopilot. Lets say for example one day your really sleepy or dont feel good, its a stress to keep the car straight. You could turn on autopilot and it could assist you with your driving, and their system has shown to be for the most part very beneficial and responsive. I would say another would be cameras above traffic lights watching for speeders and getting their license plates. This is important because people who are being risky and causing hazards on the road will get a fat ticket and will be seeing court. They are less likely to run a red light if they see a camera watching. I hope this helps you!

3 0
3 years ago
Which of the following general classes of computers designed for medical, engineering, or animation and graphics design uses are
jasenka [17]

Servers is the general classes of computers designed for medical, engineering, or animation and graphics design uses are optimized for visualization and rendering of three-dimensional models, and typically have fast processors, large memory, and advanced video cards.

D) servers

<u>Explanation:</u>

Better to use servers, where it can handle multiple tasks since it has enough multiple microprocessors.

Normal PC memory is little slow then server memory.  In case slow processing the graphics or animation end user can include memory cards in servers.  Good advanced video graphics card be insert to the server slot for better performance. Good advance video graphics has also extra memory to process the graphics animation.

Normally personal computers also be achieved but it has own limitation.  Simple animation can be achieved by personal computers.

7 0
4 years ago
Other questions:
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • What is an icon?
    6·1 answer
  • Who were the big players in the yellow journalism movement?
    7·1 answer
  • What is Livvyo? Livvyo review
    8·1 answer
  • Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti
    10·1 answer
  • is a shell program in Windows that holds individual utilities called snap-ins, designed for administration and troubleshooting.
    11·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • What is an algorithm?
    11·1 answer
  • When a person's personal information is collected by other parties, it refers to the issue of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!