Signature-based monitoring can be described as which of the following?
A. attempts to answer the question: "will this do something harmful if allowed to execute?"
B. compiles a baseline of normal activities and looks for statistical anomalies
C. examines network traffic, activity, and transactions, and looks for well-known patterns
D. continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
Answer: C
You might also like to view...
A message authentication code is also known as a __________ hash function.
Fill in the blank(s) with the appropriate word(s).
Which code example will calculate the number of checked items in a CheckedListBox named clbMovieNames and store the number in intCheckedMovies?
a. ```Dim intCheckedMovies As Integer = 0 intCheckedMovies = clbMovieNames.Items.Count – 1 ``` b. ```Dim intIndex As Integer Dim intCheckedMovies As Integer = 0 For intIndex = 0 To clbMovieNames.Items.Count – 1 If clbMovieNames.GetItemChecked(intIndex) = True Then intCheckedMovies += 1 End If Next ``` c. ```Dim intIndex As Integer Dim intCheckedMovies As Integer = 0 For intIndex = 0 To clbMovieNames.Items.Count – 1 If clbMovieNames.GetItemChecked(intIndex) = True Then lstChecked.Items.Add(clbCities.Items(intIndex)) End If Next ``` d. ```Dim intIndex As Integer Dim intCheckedMovies As Integer = 0 For intIndex= 1 To clbMovieNames.Items.Count If clbMovieNames.GetItemChecked(intIndex) = True Then intCheckedMovies += 1 End If Next ```
What hard drive technology is used to predict when a drive is likely to fail?
A. S.S.D. B. S.M.A.R.T. C. N.A.N.D. D. E.E.P.R.O.M.
Support specialists often add to or delete from a site installation check list as user and support needs change over time.
Answer the following statement true (T) or false (F)