The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.
A. event discriminator B. audit analyzer
C. archive D. alarm processor
A. event discriminator
You might also like to view...
The individual instructions that you use to write a program in a high-level programming language are called ____________.
a. directives b. commands c. statements d. orders
Which of the following is TRUE about the Recent Documents list in Office 2010?
A) It is accessed from the Home tab. B) It constantly changes. C) All files located on your hard drive can be accessed from it. D) It can be quickly accessed with the F10 key.
Of the following blog Web sites, only ________ is NOT supported by Word
A) Blogger B) Flickr C) Telligent Community D) SharePoint Blog
There are many templates available online
Indicate whether the statement is true or false