____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.?

A. ?System-monitoring
B. ?User-analysis
C. ?Network analysis
D. ?Log-analysis


Answer: B

Computer Science & Information Technology

You might also like to view...

Microsoft Office programs use ____dialogs for performing actions such as opening and saving files.

A. client B. common C. applied D. linked

Computer Science & Information Technology

When publishing a Web page, which is the suggested Browser support option?

A) Microsoft Internet Explorer 4.0 or later (high fidelity) B) Microsoft Internet Explorer 5.0, or later (high fidelity) C) Microsoft Internet Explorer 3.0, Netscape 3.0, or later D) Microsoft Internet Explorer 7.0, Netscape 6.0, or later

Computer Science & Information Technology

What should you use to verify evidence and thus ensure its integrity?

a. Hash algorithms b. Watermarks c. Steganography d. Digital certificates

Computer Science & Information Technology

Which feature limits the data that is allowed to be entered into a field?

A. Default value B. Required C. Caption D. Validation rule

Computer Science & Information Technology