Which of the following is an application that requires a host application for replication?
Micro
Worm
Trojan
Virus
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
Detective
Passive
Intuitive
Reactive