CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 32
Question 13
The ____ approach for detecting intrusions is based on the frequency
with which certain network activities take place.
Question 14
A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the log
files generated by servers, network devices, and even other IDPSs.
Question 15
The ____ is a federal law that creates a general prohibition on the
realtime monitoring of traffic data relating to communications.
Question 16
A(n) ____ is often included in legal documents to ensure that a vendor is
not liable for actions taken by a client.
Question 17