Executable profiling and threshold monitoring are examples of which of the following?
a. Preemptive blocking
b. Infiltration
c. Anomaly detection
d. Sniffing
ANS: C
You might also like to view...
The ________ is responsible for fault, configuration, accounting, performance, and security management functionality for a VNF.
A) Virtualized Infrastructure Manager B) Virtual Network Function Manager C) NFV Orchestrator D) Element management
Information is easier to understand when it is combined into a single group
Indicate whether the statement is true or false
The Document Inspector identifies personal information or hidden data with a(n):
A) animated icon. B) red flag. C) exclamation point. D) check mark.
In the case of the recovery document, what is a recovery scenario?
A) The instructions on how to recover B) The backup site needed in case of a disaster C) The written plan needed in case of a disaster D) The different kinds of ways that the organization may be called upon to recover