Which of the following is a type of anomaly detection that measures the system-wide use of resources to develop a profile of that usage?

A) Infiltration
B) Preemptive blocking
C) Resource profiling
D) Threshold monitoring


C) Resource profiling

Computer Science & Information Technology

You might also like to view...

Computers code bitmap image data using a binary color code for each pixel in the image.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can use Network Access Protection (NAP) with Remote Access and VPN clients to prove the client is free of malware by providing a(n) ____________________

a. Additional password b. Security key c. Health certificate d. Special algorithm

Computer Science & Information Technology

What is the first thing the develop can rely on when an attack occurs to the Application Guide?

A. look at the code B. view error logs C. rely on the Are You Ready section of the Application Guide D. wait for CCB direction

Computer Science & Information Technology

Suppose this is embedded in an otherwise correct and complete program. Which version of f() will be called?

Suppose class D is derived from class B, and class B has a public member function whose declaration is virtual void f();. Suppose class D has its version of the function, void f(). Here is a function definition and an invocation. ``` void g( B& b) { // other code b.f(); // other code }; g( dObject ); ``` a) D::f() b) B::f() c) This is illegal. You can’t pass a D object argument for a B reference parameter.

Computer Science & Information Technology