Question

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?

A. interconnected data software (IDS)

B. intrusion detection software (IDS)

C. security Information system (SIS)

D. internet detection scanner (IDS)

Answer

This answer is hidden. It contains 63 characters.