____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.?
A. ?System-monitoring
B. ?User-analysis
C. ?Network analysis
D. ?Log-analysis
Answer: B
You might also like to view...
Microsoft Office programs use ____dialogs for performing actions such as opening and saving files.
A. client B. common C. applied D. linked
When publishing a Web page, which is the suggested Browser support option?
A) Microsoft Internet Explorer 4.0 or later (high fidelity) B) Microsoft Internet Explorer 5.0, or later (high fidelity) C) Microsoft Internet Explorer 3.0, Netscape 3.0, or later D) Microsoft Internet Explorer 7.0, Netscape 6.0, or later
What should you use to verify evidence and thus ensure its integrity?
a. Hash algorithms b. Watermarks c. Steganography d. Digital certificates
Which feature limits the data that is allowed to be entered into a field?
A. Default value B. Required C. Caption D. Validation rule