Which of the following is an example of threshold monitoring?
a. Detecting a threat and blocking the IP address of the intruder
b. Infiltrating hacker online groups
c. Monitoring failed login attempts
d. Monitoring how programs use system resources
ANS: C
Computer Science & Information Technology
You might also like to view...
Which of the following classes is not used for file input?
a. FileInputStream b. FileReader c. ObjectInputStream d. Formatter
Computer Science & Information Technology
You cannot format Label Boxes unless they are activated
Indicate whether the statement is true or false
Computer Science & Information Technology
What are the two main causes of difficulties in reproducing colors in digital images?
What will be an ideal response?
Computer Science & Information Technology
Unlike other domains of the BSIMM, the practices of the _______________ domain focus more on strategic aspects of developing secure software.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology