Multiple Choice
A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called
A) log analysis.
B) intrusion detection systems.
C) continuous monitoring.
D) defense in depth.
Correct Answer:

Verified
Correct Answer:
Verified
Q77: Cloud computing is generally more secure than
Q78: The steps that criminals take to find
Q79: In recent years,many of the attacks carried
Q80: The most common input-related vulnerability is called
Q81: Security is a technology issue and not
Q83: _ is/are an example of a preventive
Q84: Verifying the identity of the person or
Q85: According to the Trust Services Framework,the reliability
Q86: Virtualization refers to the ability of<br>A)running multiple
Q87: The steps that criminals take to study