Multiple Choice
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder.
A) Signature detection
B) Anomaly detection
C) Profile based detection
D) Threshold detection
Correct Answer:

Verified
Correct Answer:
Verified
Q35: The two types of audit records that
Q36: Memory cards can store and process data.
Q37: The _ determines whether the user is
Q38: Virtually all multiuser systems, network-based servers, Web-based
Q39: An important feature of Windows security is
Q40: _ is based on pattern recognition.<br>A) Password
Q42: When a file containing a polymorphic virus
Q43: Traditional DAC systems define the access rights
Q44: Smart tokens include an embedded _ .<br>A)
Q45: The success of the digital immune system