Answer the following statements true (T) or false (F)
1. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. ??
2. Trojan horses and viruses are confined to network based attacks. ?
3. ?Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions.
4. Statistical approaches attempt to define proper behavior and rule-based approaches attempt to define normal or expected behavior. ?
5. ??The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. ??
1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
You might also like to view...
In object-oriented terminology, you "____" a segment of code that might cause an error.
A. try B. catch C. throw D. observe
What are the class access modifiers in C#?
What will be an ideal response?
The structure pointer operator is evaluated from left to right.
Answer the following statement true (T) or false (F)
Even when an emulator is idling, it consumes a significant amount of CPU time.
Answer the following statement true (T) or false (F)