Answer:
net use X: \\SERVER\Share
Explanation:
1. Connect securely to the remote computer or ensure you have access to it on the network
2. then follow the step below:
Where X: is the drive letter you wish to map the share to, and \\SERVER\Share is the UNC path to the share. This should make the share visible in My Computer and the command line as well like all other shares mapped through the GUI.
In order to later disconnect the share, you would use
net use X: /delete
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.
above
dgczjklcxhvzkojcvrhyujnhb
explanation: