Multiple Choice
An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.
A) anomaly
B) IDS
C) intrusion
D) analyzer
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q17: A(n) _ is hardware or software products
Q18: the _ to an IDS enables a
Q19: Data collection, correlation, alerting, and reporting/compliance are
Q20: _ is the identification, collection, examination, and
Q21: An IDS comprises three logical components: sensors,
Q23: Malicious software, commonly called _ , is
Q24: the first step in a DDoS attack
Q25: A _ attack attempts to consume the
Q26: the _ defines the transport protocol.<br>A)interface<br>B)IP protocol
Q27: there are two general approaches to intrusion