Which of the following security controls would be applied on individual hosts to monitor suspicious activities, by actively analyzing events occurring within that host, and blocking any suspicious or abnormal activity?

A. HIPS
B. Spam filter
C. HIDS
D. Firewall


Answer: A. HIPS

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) A breadth-first traversal uses a stack as a supporting data structure. 2) An adjacency matrix is one approach to implementing a graph that uses a two-dimensional array. 3) A spanning tree of a graph does not necessarily include all of the edges of the graph. 4) A cycle is a path that starts and ends on the same vertex. 5) minimum spanning tree of a weighted graph is a spanning tree in which the sum of the weights of the edges is less than or equal to the sum of the weights for any other spanning tree for the same graph.

Computer Science & Information Technology

Access is a great tool because you can have many working databases opened at once

Indicate whether the statement is true or false

Computer Science & Information Technology

Placing one open window on top of another open window with just the title bar and a portion of the border visible, is known as ________

A) sorting B) searching C) indexing D) cascading

Computer Science & Information Technology

An external virtual switch binds a virtual switch to a host's physical network adapter.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology