This topic contains a solution. Click here to go to the answer

Author Question: ____________________are designed primarily to log network traffic and examine it for known patterns ... (Read 11 times)

danielfitts88

  • Hero Member
  • *****
  • Posts: 535
___________________ _are designed primarily to log network traffic and examine it for known patterns indicating attacks.
 
  a. Firewalls
  b. Antivirus programs
  c. Intrusion detection systems (IDs)
  d. Key logs

Question 2

Microsoft's ________ provides more security and is more efficient in terms of utilization of storage spacethan FAT.
 
  Fill in the blank(s) with correct word



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

poopface

  • Sr. Member
  • ****
  • Posts: 339
Answer to Question 1

c

Answer to Question 2

NTFS



danielfitts88

  • Hero Member
  • *****
  • Posts: 535
Both answers were spot on, thank you once again




 

Did you know?

A good example of polar molecules can be understood when trying to make a cake. If water and oil are required, they will not mix together. If you put them into a measuring cup, the oil will rise to the top while the water remains on the bottom.

Did you know?

Bacteria have been found alive in a lake buried one half mile under ice in Antarctica.

Did you know?

Eating food that has been cooked with poppy seeds may cause you to fail a drug screening test, because the seeds contain enough opiate alkaloids to register as a positive.

Did you know?

Never take aspirin without food because it is likely to irritate your stomach. Never give aspirin to children under age 12. Overdoses of aspirin have the potential to cause deafness.

Did you know?

Cyanide works by making the human body unable to use oxygen.

For a complete list of videos, visit our video library