<span>To carry computer data over the long haul, wan need to have a </span>POP (point of presence) <span>in multiple towns and cities. It is a</span><span>n artificial demarcation point OR interface point between communicating entities</span>
Answer: D) Task-centered design
Explanation: Task centered design is the technique for a design to made in such a way that it can have the desired or expected result . The goals are set in it and the task is decided in a particular structure. Thus a design having any such system , it is known as task centered design. It is mainly focused on the user and the way this design can be used by them.
Answer:
Signature-based IDS.
Explanation:
IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.
Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;
1. Statistical anomaly-based detection.
2. Stateful protocol analysis detection.
3. Signature-based detection.
In this scenario, your manager wants you to implement a type of intrusion detection system (IDS) that can be matched to certain types of traffic patterns. Thus, this kind of IDS is known as a signature-based IDS.
A signature-based detection system refers to a type of detection and protection system used to detect a malicious attack such as a worm, virus, trojan, malware etc., by checking and matching them with a repository of specific signatures, patterns or fingerprints.
Answer: d) Exploit
Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.
Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).