Description (TCO 6) In terms of physical security, _____ refers to protecting important assets by using several perimeters. (TCO 6) Using a token and a password to authenticate is an example of_____. (TCO 6) The best fire extinguisher for petroleum products is a _____. (TCO 6) _____ are computers in a network that host applications and data for everyone to share. (TCO 6) _____ are applications designed to detect, log, and respond to unauthorized network or host use, both in real time and after the fact. (TCO 6) Media can be divided into three categories: _____. (TCO 6) The model that most modern intrusion-detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann, called the _____. (TCO 6) What does a host-based IDS monitor? (TCO 6) Which of the following is not an advantage of network-based IDS? (TCO 6) Egress filtering _____.