IT Essentials 8 & ITE 7.02 | |
Final Exam Answers Ch 1 - 9 | |
Final Exam Answers Ch 10 - 14 | |
Final Exam Composite Answers Ch 1 - 14 | |
IT Essentials 8 & ITE 7.02 - Chapter 5 | |
Chapter 5 Exam Answers | Online Test |
Chapter 5 Quiz Answers | Online Test |
IT Essentials 8 & ITE 7.02 - Chapter 6 | |
Chapter 6 Exam Answers | Online Test |
Chapter 6 Quiz Answers | Online Test |
IT Essentials 8 & ITE 7.02 - Lab Answers | |
5.4.2.8 Lab – Build and Test a Network Cable Answers |
Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack?
- IPS
- IDS
- proxy server
- firewall
Answers Explanation & Hints: An IDS system is implemented to passively monitor the traffic on a network. Both an IPS and a firewall actively monitor network traffic and take immediate actions when previously defined security criteria match. A proxy server, when it functions as a firewall, also actively monitors the traffic that travels through it and takes immediate actions.
IT Essentials 8 & ITE 7.02 | |
Final Exam Answers Ch 1 - 9 | |
Final Exam Answers Ch 10 - 14 | |
Final Exam Composite Answers Ch 1 - 14 | |
IT Essentials 8 & ITE 7.02 - Chapter 5 | |
Chapter 5 Exam Answers | Online Test |
Chapter 5 Quiz Answers | Online Test |
IT Essentials 8 & ITE 7.02 - Chapter 6 | |
Chapter 6 Exam Answers | Online Test |
Chapter 6 Quiz Answers | Online Test |
IT Essentials 8 & ITE 7.02 - Lab Answers | |
5.4.2.8 Lab – Build and Test a Network Cable Answers |