What is the term used to describe an entry in a database describing a violation or exploit which is used to match real-time events in order to detect and record attacks by the continuous monitoring solution?
A. Countermeasure
B. Threat
C. Signature
D. Vulnerability
Answer: C. Signature
You might also like to view...
A ____________________ access point does not have to be individually connected by a cable to the wired network but can communicate with other access points of the same type to reach the wired connection.
Fill in the blank(s) with the appropriate word(s).
A(n) ________ document contains instructions for displaying its contents in a web browser
A) Access 2010 B) Word 2010 C) RTF D) HTML
To display a long text label on two or more lines within a single cell:
A) insert a line break with Ctrl+Enter. B) type the first line, press Enter, and type the remaining line. C) use F2 to insert a line break after the first line. D) insert a line break with Alt+Enter.
What are thumbnail sketches, and what is their purpose?
What will be an ideal response?