Which of the following is NOT a type of event that you would normally monitor?

A. user account creation
B. e-mail attachment handling
C. antivirus scanning
D. access to shared folders


Answer: D

Computer Science & Information Technology

You might also like to view...

The correct salutation for a letter addressed to a company is ____.

A. Dear Company B. Dear Sir C. Ladies and Gentlemen D. To Whom It May Concern

Computer Science & Information Technology

What secure protocol is recommended for voice and video?

A. SRTP B. S/MIME C. IMAP D. IPsec

Computer Science & Information Technology

The ____ topology is the oldest communications design method, with roots in telephone switching systems.

A. star B. mesh C. ring D. bus

Computer Science & Information Technology

All organizations with a router at the boundary between the organization's internal networks and the external service provider will experience improved network performance due to the complexity of the ACLs used to filter the packets.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology