CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 32

Question 13 The ____ approach for detecting intrusions is based on the frequency with which certain network activities take place. Question 14 A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the log files generated by servers, network devices, and even other IDPSs. Question 15 The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications. Question 16 A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client. Question 17