What practice addresses the ability to make authorized changes and detect unauthorized changes and activities using process like application behavior monitoring and diagnostics?

Fill in the blank(s) with the appropriate word(s).


Configuration management and vulnerability management

Computer Science & Information Technology

You might also like to view...

What is the display after the function math() executes?

source file: mySource.js: ``` 1. function product(x.y); 2. { 3. var x; var y; var product; 4. product = x * y; 5. return (product); 6. } ``` web page script, assume the file links to mySource.js: ``` 1. function math(); 2. { 3. var num1 = 3; var num2 = 4; 4. var result = product(num2, num1); 5. document.write(num2 + " X " + num1 + " = " + result); 6. } 7. function product(a.b); 8. { 9. var a; var b; var answer; 10. answer = a * b * b; 11. } ``` a. 4 X 3 = 12 b. 4 X 3 = 36 c. 3 X 4 = 12 d. 3 X 4 = 36

Computer Science & Information Technology

Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?

A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4

Computer Science & Information Technology

A spam __________ uses a set of rules to examine email messages and determine which are spam.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The OS maintains a __________ for each process that shows the frame location for each page of the process.

A. kernel B. page table C. TLB D. logical address

Computer Science & Information Technology