What is the means of incident or violation detection which is based on a collected sample of the unwanted activity?

A. Heuristic
B. Behavioral
C. Anomaly
D. Signature


Answer: D. Signature

Computer Science & Information Technology

You might also like to view...

To get a good view of an entire worksheet before you change margins, you might want to reduce the zoom level to less than _____.

A. 80% B. 100% C. 75% D. 50%

Computer Science & Information Technology

Specify which of the following statements are functional requirements and which are nonfunctional requirements:

• “The ticket distributor must enable a traveler to buy weekly passes.” • “The ticket distributor must be written in Java.” • “The ticket distributor must be easy to use.”

Computer Science & Information Technology

NTFS follows the ____ standard, which includes case-sensitive filenames and the use of multiple filenames.

A. SYSV B. POSIX.1 C. Windows D. POSTIX

Computer Science & Information Technology

VPN connection settings cannot be changed on a domain wide basis using group policy.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology