What is a common means to discover a violating event?
A. Intrusion detection system (IDS)
B. Multi-factor authentication
C. Asymmetric encryption
D. Certificate revocation
Answer: A. Intrusion detection system (IDS)
You might also like to view...
A database schema defines the name, data type, and length of each field in the database
Indicate whether the statement is true or false
When configuring a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
Answer the following statement true (T) or false (F)
?In Private browsing mode, all of the following are deleted from the computer you are using when you close the file EXCEPT:
A. ?downloads B. ?searches C. ?cookies D. ?temporary files
A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately for one week every quarter. Which of the following is the BEST response to this situation?
A. Remove the account expiration from the accounts B. Delete the account C. Reset the Accounts D. Disable the accounts