__________ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner.
What will be an ideal response?
Question 2
The _________ to an IDS enables a user to view output from the system or control the behavior of the system.
What will be an ideal response?