Sign Up
Log In
Home
discussion
Exam 200-201 Question id=5993 Network intrusion analysis

Drag and drop the uses on the left onto the type of security system on the right.

ensures protection of individual devices
monitors host for suspicious activity
detects intrusion attempts
monitors incoming traffic and connections
Endpoint
ensures protection of individual devices
Endpoint
monitors host for suspicious activity
Network
detects intrusion attempts
Network
monitors incoming traffic and connections