What is the means of incident or violation detection which is based on a collected sample of the unwanted activity?
A. Heuristic
B. Behavioral
C. Anomaly
D. Signature
Answer: D. Signature
You might also like to view...
To get a good view of an entire worksheet before you change margins, you might want to reduce the zoom level to less than _____.
A. 80% B. 100% C. 75% D. 50%
Specify which of the following statements are functional requirements and which are nonfunctional requirements:
• “The ticket distributor must enable a traveler to buy weekly passes.” • “The ticket distributor must be written in Java.” • “The ticket distributor must be easy to use.”
NTFS follows the ____ standard, which includes case-sensitive filenames and the use of multiple filenames.
A. SYSV B. POSIX.1 C. Windows D. POSTIX
VPN connection settings cannot be changed on a domain wide basis using group policy.
Answer the following statement true (T) or false (F)