Which of the following type of anomaly detection measures the system use of resources to develop a profile of that usage?

a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring


ANS: C

Computer Science & Information Technology

You might also like to view...

Which of the following operations has the highest precedence?

a. Postincrement. b. Multiplication. c. Addition. d. Assignment.

Computer Science & Information Technology

The ____________________ attribute is used to merge cells across rows.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Microsoft Graphic Object format will NOT let the user edit the data in the file

Indicate whether the statement is true or false

Computer Science & Information Technology

Security vulnerabilities can be classified into three categories: natural events, internal events, and external events. Which example is true regarding security vulnerabilities:

- Natural disasters accounts for the majority of reported security events - Cloud-based services such as fitness trackers and personal health records are not vulnerable to hacking due to the many layers of protection - Implantable medical devices such as pacemakers and defibrillators are not security threats due to the secure networks used to transfer data - Many internal breaches are due to lapses in judgement and lack of training

Computer Science & Information Technology