What looks for people on the network who shouldn't be there or who are acting
suspiciously?
a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software
suspiciously?
a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software