A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.
A. trigger
B. database journal
C. event
D. attack profile
Answer: D
You might also like to view...
A rectangular array ________.
a) requires two indices to identify elements b) is often used to represent a table of data c) contains the same number of columns in each row d) is a two-dimensional array e) All of the above.
Which of the following allows an administrator to specify what applications are allowed access?
A) Packet filtering B) Router C) Stateful inspection D) Application gateway
Which of the following is an example of online advertising?
(a) Placing links and banners on other companies’ Web sites. (b) Advertising your Web site on TV. (c) Registering your site with search engines. (d) Both (a) and (c).
What is the most common number of extension characters seen in a filename?
A) 8 B) 11 C) 7 D) 3 or 4