Tom is tuning his security monitoring tools in an attempt to reduce the number of alerts received by administrators without missing important security events. He decides to configure the system to only report failed login attempts if there are five failed attempts to access the same account within a one-hour period of time. What term best describes the technique that Tom is using?

A. Thresholding
B. Sampling
C. Account lockout
D. Clipping


Answer: D. Clipping

Computer Science & Information Technology

You might also like to view...

The recursion step should:

a. check for the base case. b. call a fresh copy of the recursive method to work on a smaller problem. c. make two calls to the recursive method. d. iterate until it reaches a termination condition.

Computer Science & Information Technology

Write a statement that creates and initializes a static variable named salesTax to 7.59.

What will be an ideal response?

Computer Science & Information Technology

Data flows in both directions in a ring network

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____________________ displays all properties and property keyframes for a selected motion tween.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology