Which of the following type of anomaly detection measures the system use of resources to develop a profile of that usage?
a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring
ANS: C
You might also like to view...
Which of the following operations has the highest precedence?
a. Postincrement. b. Multiplication. c. Addition. d. Assignment.
The ____________________ attribute is used to merge cells across rows.
Fill in the blank(s) with the appropriate word(s).
The Microsoft Graphic Object format will NOT let the user edit the data in the file
Indicate whether the statement is true or false
Security vulnerabilities can be classified into three categories: natural events, internal events, and external events. Which example is true regarding security vulnerabilities:
- Natural disasters accounts for the majority of reported security events - Cloud-based services such as fitness trackers and personal health records are not vulnerable to hacking due to the many layers of protection - Implantable medical devices such as pacemakers and defibrillators are not security threats due to the secure networks used to transfer data - Many internal breaches are due to lapses in judgement and lack of training