The main location for VMM information is the __________ database.
Fill in the blank(s) with the appropriate word(s).
SQL
You might also like to view...
________ is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
Fill in the blank(s) with the appropriate word(s).
The process of testing a network defense system is referred to as which of the following?
A. security auditing B. change management C. IDPS evaluation D. distributed data collection
A word in a search query that describes something you're looking for is called a(n) ________
Fill in the blank(s) with correct word
Which of the following is a DNS record that is no longer valid either because the resource is offline for an extended period or permanently or because the resource's name or address has changed?
A. invalid resource record B. stale resource record C. used resource record D. offline resource record