Security auditing can:

a. provide data that can be used to define anomalous behavior
b. maintain a record useful in computer forensics
c. generate data that can be used in after-the-fact analysis of an attack
d. all of the above


d. all of the above

Computer Science & Information Technology

You might also like to view...

Too much text on a slide usually requires a smaller ________ size that can be difficult to read by the audience

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you make changes to a base style:

A) the base style and any styles based on it will all be updated. B) only the base style will be updated. C) you will be asked to choose whether or not you want styles based on it updated also. D) a new style will be created with the change, but the base style itself will not change.

Computer Science & Information Technology

Provide an overview of the VPN protocol called Layer 2 Tunneling Protocol (L2TP).

What will be an ideal response?

Computer Science & Information Technology

The __________ command is used to display the changes made in a document and the names of the reviewers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology