The Internet Database Environment
An intrusion detection system does not perform which of the following?

May monitor packets passing over the network.
Set up deception systems that attempt to trap hackers.
May transmit message packets to the correct destination.
Tries to identify attempts to hack into a computer system.

ANSWER DOWNLOAD EXAMIANS APP

The Internet Database Environment
What is Hypertext Transfer Protocol (HTTP)?

The protocol to copy files between computers
The hardware/software protocol that limits access to company data
The transfer protocol to transfer Web pages to a browser
The database access protocol for SQL statements

ANSWER DOWNLOAD EXAMIANS APP