Answer: That due to the specific tasks that needs to be accomplished by each program to make an all encompassing program would be inefficient and full of bugs
Explanation: try to do something along those lines ex why would MySQL be used to check your essay for grammar the tasks are on opposite spectrums
A mail server. --------------------------------------------
Is an example of reactive, signature based IDS/IPS
Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.
Answer:
Server
Explanation:
Servers are used to house information from websites to video games.
Answer:
Use a firewall
Install antivirus software.
Explanation: