Which of the following is an example of threshold monitoring?

a. Detecting a threat and blocking the IP address of the intruder
b. Infiltrating hacker online groups
c. Monitoring failed login attempts
d. Monitoring how programs use system resources


ANS: C

Computer Science & Information Technology

You might also like to view...

Which of the following classes is not used for file input?

a. FileInputStream b. FileReader c. ObjectInputStream d. Formatter

Computer Science & Information Technology

You cannot format Label Boxes unless they are activated

Indicate whether the statement is true or false

Computer Science & Information Technology

What are the two main causes of difficulties in reproducing colors in digital images?

What will be an ideal response?

Computer Science & Information Technology

Unlike other domains of the BSIMM, the practices of the _______________ domain focus more on strategic aspects of developing secure software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology