________ feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to protect against suspicious network traffic and attempts to access files and databases.

Respuesta :

Intrusion Detection Systems feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to protect against suspicious network traffic and attempts to access files and databases. It  generates an alarm if it finds a suspicious or anomalous event.