Multiple Choice
Which method of intrusion-detection develops historic usage levels to measure activity against?
A) Application profiling
B) Infiltration profiling
C) Resource profiling
D) Threshold monitoring
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: The system administrator can be alerted by
Q2: Banishment vigilance is another name for:<br>A)anomaly detection<br>B)intrusion
Q3: Implementation of intrusion deflection as a strategy
Q4: Which is NOT one of the basic
Q6: Machines set up as apparent targets used
Q7: In _ the system uses software and
Q8: Symantec's Decoy Server is a software IDS
Q9: One of the most well-known free software-based
Q10: Which intrusion detection strategy monitors and compares
Q11: An intrusion-detection system detecting a series of