A.NIPS B.Honeypot C.DMZ D.NIDS
A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
A.Intrusion detection B.Virtualization C.Kiting D.Cloning