Answer the following statements true (T) or false (F)

1. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. ??
2. Trojan horses and viruses are confined to network based attacks. ?
3. ?Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions.
4. Statistical approaches attempt to define proper behavior and rule-based approaches attempt to define normal or expected behavior. ?
5. ??The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. ??


1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

In object-oriented terminology, you "____" a segment of code that might cause an error.

A. try B. catch C. throw D. observe

Computer Science & Information Technology

What are the class access modifiers in C#?

What will be an ideal response?

Computer Science & Information Technology

The structure pointer operator is evaluated from left to right.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Even when an emulator is idling, it consumes a significant amount of CPU time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology