Multiple Choice
__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.
A) Intrusion detection
B) Fingerprint based scanners
C) Behavior blocking software
D) Heurisics
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: _ is not a central element of
Q3: One of the best known protection mechanisms
Q4: The _ prevents duplicate passwords from being
Q5: A password cracker is a password guessing
Q6: A hashed password technique typically combines the
Q7: _ controls access based on comparing security
Q8: Objects that a user possesses for the
Q9: Authentication protocols used with smart tokens are
Q10: An _ dictates what types of access
Q11: The motivation for the development of the