A ________ is software that captures every action undertaken by an individual user of a suspect machine
Fill in the blank(s) with the appropriate word(s).
Answer: keylogger
You might also like to view...
HTTP implements the __________ layer of the TCP/IP protocol stack.
a) link b) network c) transport d) application
A ________ is a saved series of commands used to automate repetitive processes
Fill in the blank(s) with correct word
A new vendor product has been acquired to replace an internal network security product. The vendor for the existing solution has announced a retirement date that is quickly approaching. Management requests that you deploy the new solution as quickly as possible. Only essential activities should be performed. Which sequence best describes the order of activities when balancing security posture and
time constraints? A. Decommission the old solution, install the new solution, and test the new solution. B. Install the new solution, migrate to the new solution, and test the new solution. C. Test the new solution, migrate to the new solution, and decommission the old solution. D. Install the new solution, test the new solution, and decommission the old solution.
The author Darnell Littal believes that "Beyond bad markets and economic news, the number one reason that mergers fail is the absence of a well-understood _____."
a. worker's doctrine b. business plan c. fiscal target d. human performance plan