Which of the following is a method of anomaly detection used by IDS?

A) User/group work profiling
B) Resource profiling
C) Threshold monitoring
D) All of the above


D) All of the above

Computer Science & Information Technology

You might also like to view...

Which of the following is false?

a. The last element of an array has position number one less than the array size. b. The position number contained within square brackets is called a subscript. c. A subscript cannot be an expression. d. All of the above.

Computer Science & Information Technology

The square of n can be calculated by noting that square(n) = square(n-1) + diff(n-1). diff(n) = diff(n-1)+2. The square(0)=0, diff(0)=1. What is the stopping condition for this recursive definition?

a. n=1 b. n=0 c. n=-1 d. unknown

Computer Science & Information Technology

A ____________________ program tolerates errors in user inputs and recovers gracefully.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Browsers generally limit the number of __________ that can be requested from a single server simultaneously.

A. bytes B. lines of code C. files D. favicons

Computer Science & Information Technology