Which of the following is a method of anomaly detection used by IDS?
a. Executable profiling
b. User/group work profiling
c. Resource profiling
d. Threshold monitoring
e. All the above
ANS: E
You might also like to view...
Which of the following statements is FALSE?
A) Everything a computer does is broken down into a series of 0s and 1s. B) When referring to computers, every number, letter, or special character consists of a unique combination of 8 bits. C) Bit is short for binary digit. D) A single bit can represent a single letter.
Match the following terms to their meanings:
I. primary storage II. secondary storage III. solid state drive IV. optical media V. flash memory A. compact disc B. stores the results of processed data C. does not require constant power D. stores data and instructions during processing E. large amounts of flash memory and is intended to replace the hard drive
What will you see if you enter the TODAY function without the parenthesis?
A) #VALUE? B) #FUNCTION? C) Nothing. It will fill in the parenthesis for you. D) #NAME?
____________________ comments allow multiple lines of text to be added.
Fill in the blank(s) with the appropriate word(s).