______ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
a. Stateful inspections
b. Intrusion detection systems
c. Application proxy filtering technologies
d. Packet filtering technologies
Answer: B
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.