A.Signature-based NIPS B.Signature-based NIDS C.Honeypot D.Behavior-based HIDS
A.Protocol analyzer B.Vulnerability scanner C.Port scanner D.Penetration test
A.NIPS B.Honeypot C.DMZ D.NIDS