Answer:
Deleting files and etc on your computer.
The answer to this question would be "Licensing"
Is an example of reactive, signature based IDS/IPS
Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.
Answer:
<em>B. Pirated software
</em>
Explanation:
Software piracy is used <em>to define the act of using, duplicating or transferring software unlawfully without property or legal rights. </em>
Today, most software is bought as a single-user permit, <em><u>which means that at one moment only one PC could have that software running on it.
</u></em>
Trying to copy the software to various devices or distributing it without multiple licenses is regarded to be illegal software piracy.