____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.
Fill in the blank(s) with the appropriate word(s).
System-monitoring
You might also like to view...
Which of the following is the outcome of policy review?
A) Retirement or renewal B) Retirement or reauthorization C) Renewal or reauthorization D) None of the above
When analyzing a file created in Microsoft Word you see that the file was printed four days earlier than it was supposedly created. Which of the following circumstances could cause this, yet be perfectly innocent in nature?
a. The file was created on one machine, copied to a flash drive, then copied to this machine and finally printed. b. The file was opened remotely from another machine running Microsoft Windows and then saved back to its original location. c. The user used the Move function instead of the copy function to make a copy of the file on its new location. d. Nothing innocent can do this. Anything that changes the create date is malevolent in nature.
There is no difference in a residential and a commercial lease.
Answer the following statement true (T) or false (F)
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
A. NIDPSs B. HIDPSs C. AppIDPSs D. SIDPSs