What is the term used to describe an entry in a database describing a violation or exploit which is used to match real-time events in order to detect and record attacks by the continuous monitoring solution?

A. Countermeasure
B. Threat
C. Signature
D. Vulnerability


Answer: C. Signature

Computer Science & Information Technology

You might also like to view...

A ____________________ access point does not have to be individually connected by a cable to the wired network but can communicate with other access points of the same type to reach the wired connection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ document contains instructions for displaying its contents in a web browser

A) Access 2010 B) Word 2010 C) RTF D) HTML

Computer Science & Information Technology

To display a long text label on two or more lines within a single cell:

A) insert a line break with Ctrl+Enter. B) type the first line, press Enter, and type the remaining line. C) use F2 to insert a line break after the first line. D) insert a line break with Alt+Enter.

Computer Science & Information Technology

What are thumbnail sketches, and what is their purpose?

What will be an ideal response?

Computer Science & Information Technology