Drag and drop the uses on the left onto the type of security system on the right.
ensures protection of individual devices
|
monitors host for suspicious activity
|
detects intrusion attempts
|
monitors incoming traffic and connections
|
|
Endpoint
|
ensures protection of individual devices
|
Endpoint
|
monitors host for suspicious activity
|
Network
|
detects intrusion attempts
|
Network
|
monitors incoming traffic and connections
|
|
WARNING
the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...