Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.
Fill in the blank(s) with the appropriate word(s).
profiles
You might also like to view...
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
A. DiD B. DMZ C. VPN D. IDPS
The __________ argument of the JOptionPane.showInputDialog method specifies the prompt that appears above an input dialog’s JTextField.
a) first b) second c) third d) fourth
In Word, ________ help direct the reader's eye to the information that you consider important
A) symbols B) columns C) borders and shading D) tabs and leaders
Which of the following is a set of programs containing instructions that coordinate all the activities among computer hardware resources?
A. operating system B. disk-based system C. management system D. platform system