Executable profiling and threshold monitoring are examples of which of the following?

a. Preemptive blocking
b. Infiltration
c. Anomaly detection
d. Sniffing


ANS: C

Computer Science & Information Technology

You might also like to view...

The ________ is responsible for fault, configuration, accounting, performance, and security management functionality for a VNF.

A) Virtualized Infrastructure Manager B) Virtual Network Function Manager C) NFV Orchestrator D) Element management

Computer Science & Information Technology

Information is easier to understand when it is combined into a single group

Indicate whether the statement is true or false

Computer Science & Information Technology

The Document Inspector identifies personal information or hidden data with a(n):

A) animated icon. B) red flag. C) exclamation point. D) check mark.

Computer Science & Information Technology

In the case of the recovery document, what is a recovery scenario?

A) The instructions on how to recover B) The backup site needed in case of a disaster C) The written plan needed in case of a disaster D) The different kinds of ways that the organization may be called upon to recover

Computer Science & Information Technology