Multiple Choice
__________ is a monitored behavior.
A) Attempts to open,view,delete,and / or modify files
B) Attempts to format disk drives and other unrecoverable disk operations
C) Modification to the logic of executable files or macros
D) All of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: _ is a set of protocols for
Q19: A key logical component of an IDS
Q20: IPSec provides authentication,encryption,and key exchange functions.
Q21: Which security area is addressed in IEEE
Q22: SSL performs encryption first,followed by computing a
Q24: Intrusion detection is based on the assumption
Q25: Generic decryption (GD)technology enables the antivirus program
Q26: Ipsec is based primarily upon the DES
Q27: A _ is a hardware or software
Q28: A(n)_ looks for user behavior that differs