Which of the following is NOT a type of event that you would normally monitor?
A. user account creation
B. e-mail attachment handling
C. antivirus scanning
D. access to shared folders
Answer: D
You might also like to view...
The correct salutation for a letter addressed to a company is ____.
A. Dear Company B. Dear Sir C. Ladies and Gentlemen D. To Whom It May Concern
What secure protocol is recommended for voice and video?
A. SRTP B. S/MIME C. IMAP D. IPsec
The ____ topology is the oldest communications design method, with roots in telephone switching systems.
A. star B. mesh C. ring D. bus
All organizations with a router at the boundary between the organization's internal networks and the external service provider will experience improved network performance due to the complexity of the ACLs used to filter the packets.
Answer the following statement true (T) or false (F)