Multiple Choice
The types of monitoring include
A) Penetration testing and access control
B) Health checking and log monitoring
C) Nagios and log monitoring
D) Reactive monitoring and pro-active testing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: A part of a system whose failure
Q16: Redundancy is<br>A) Availability of choices<br>B) Surplus capacity,
Q17: UNIX was developed by<br>A) Ken Thompson and
Q18: Common functions of Linux System Administration utilities
Q19: A hot spare is a<br>A) Single point
Q20: Active Directory<br>A) Encourages computer users to perform
Q21: Open source software is<br>A) An operating system
Q23: Cloud computing models include all of the
Q24: A virtual machine<br>A) Is another name for
Q25: The system security officer is the person