200k views
4 votes
New systems can respond to an incident threat autonomously, based on preconfigured options that go beyond simple defensive actions usually associated with IDPS and IPS systems. These systems, referred to as ____, use a combination of resources to detect an intrusion and then to trace the intrusion back to its source.

1 Answer

4 votes

Answer:site policy

Step-by-step explanation:

I think...

User Mattdlockyer
by
5.4k points