Multiple Choice
Which intrusion detection strategy monitors and compares activity against preset acceptable levels?
A) Application monitoring
B) Infiltration monitoring
C) Resource profiling
D) Threshold monitoring
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: Which method of intrusion-detection develops historic usage
Q6: Machines set up as apparent targets used
Q7: In _ the system uses software and
Q8: Symantec's Decoy Server is a software IDS
Q9: One of the most well-known free software-based
Q11: An intrusion-detection system detecting a series of
Q12: Following rules and learning from experience as
Q13: Which is NOT a function of an
Q14: Which type of intrusion-detection relies on people
Q15: Symantec Decoy Server does all of the