The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.

A. event discriminator B. audit analyzer

C. archive D. alarm processor


A. event discriminator

Computer Science & Information Technology

You might also like to view...

The individual instructions that you use to write a program in a high-level programming language are called ____________.

a. directives b. commands c. statements d. orders

Computer Science & Information Technology

Which of the following is TRUE about the Recent Documents list in Office 2010?

A) It is accessed from the Home tab. B) It constantly changes. C) All files located on your hard drive can be accessed from it. D) It can be quickly accessed with the F10 key.

Computer Science & Information Technology

Of the following blog Web sites, only ________ is NOT supported by Word

A) Blogger B) Flickr C) Telligent Community D) SharePoint Blog

Computer Science & Information Technology

There are many templates available online

Indicate whether the statement is true or false

Computer Science & Information Technology