In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.
A. baseline
B. signature
C. pattern
D. false positives
Answer: A
Computer Science & Information Technology
You might also like to view...
USB flash drives use ____________________ storage technology, which provides fast access to data, and holds data even when not connected to a power source.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In the accompanying figure, item 3 is the frame that represents the ____.
A. border of the frame B. border of the mask C. border of the graphic D. border of box
Computer Science & Information Technology
Special software is not required to include electronic postage when creating envelopes
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is a program or set of instructions in a program that allows users to bypass security controls?
A. keygens B. indices C. rootkit D. back door
Computer Science & Information Technology