This topic contains a solution. Click here to go to the answer

Author Question: ____________________are designed primarily to log network traffic and examine it for known patterns ... (Read 7 times)

danielfitts88

  • Hero Member
  • *****
  • Posts: 535
___________________ _are designed primarily to log network traffic and examine it for known patterns indicating attacks.
 
  a. Firewalls
  b. Antivirus programs
  c. Intrusion detection systems (IDs)
  d. Key logs

Question 2

Microsoft's ________ provides more security and is more efficient in terms of utilization of storage spacethan FAT.
 
  Fill in the blank(s) with correct word



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

poopface

  • Sr. Member
  • ****
  • Posts: 339
Answer to Question 1

c

Answer to Question 2

NTFS



danielfitts88

  • Hero Member
  • *****
  • Posts: 535
Both answers were spot on, thank you once again




 

Did you know?

Of the estimated 2 million heroin users in the United States, 600,000–800,000 are considered hardcore addicts. Heroin addiction is considered to be one of the hardest addictions to recover from.

Did you know?

In ancient Rome, many of the richer people in the population had lead-induced gout. The reason for this is unclear. Lead poisoning has also been linked to madness.

Did you know?

More than nineteen million Americans carry the factor V gene that causes blood clots, pulmonary embolism, and heart disease.

Did you know?

A recent study has found that following a diet rich in berries may slow down the aging process of the brain. This diet apparently helps to keep dopamine levels much higher than are seen in normal individuals who do not eat berries as a regular part of their diet as they enter their later years.

Did you know?

The Babylonians wrote numbers in a system that used 60 as the base value rather than the number 10. They did not have a symbol for "zero."

For a complete list of videos, visit our video library