1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
8

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.

Computers and Technology
1 answer:
notka56 [123]3 years ago
4 0

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

You might be interested in
what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
Andrews [41]

google does that, and yahoo, and bing. it would be a search engine, or browser.

5 0
3 years ago
Sally thought of adding a new paragraph after the
hram777 [196]

Answer:

1) press the enter key

2) start typing the new paragraph

Explanation:

did it on edg

7 0
4 years ago
How do u set up a Wi-Fi network on Android ​
AlladinOne [14]

Answer:

These are some way I know

5 0
3 years ago
What does ADF Means?<br><br> What does CLO Means?
Elenna [48]
ADF means 'automatic document feeder'

CLO means 'collateralized loan obligation'
3 0
4 years ago
What are hard ware and software requirments in multimedia computer system
marishachu [46]

Answer:

Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.

Explanation:

BRAINLEST

4 0
3 years ago
Other questions:
  • Explain the steps you take when conducting research online to ensure it the source is providing reliable information.
    6·1 answer
  • Why are networked systems beneficial?
    9·2 answers
  • Assume that given , middle and family are three variables of type string that have been assigned values . Write an expression wh
    5·1 answer
  • Write three tasks students can preform in a digital classroom?
    9·2 answers
  • In terms of in-house custom engines versus third-party engines (like Unity), what has changed today from decades ago, and why?
    8·1 answer
  • Is Wikipedia or a .gov website with more information about the subject not a good enough explanation not a good explanation for
    7·1 answer
  • Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network.
    15·1 answer
  • Write a 200 word essay about how a computer is made.<br><br>Good luck.​
    9·1 answer
  • Write down the importance of computers in this modern era of information technology in brief.​
    13·1 answer
  • Question # 9
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!