The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.
A. event discriminator B. audit analyzer
C. archive D. alarm processor
A. event discriminator
Computer Science & Information Technology
You might also like to view...
All Excel formulas begin with ________
A) @ B) # C) = D) *
Computer Science & Information Technology
File _________________________ are identified by a three- or four-letter suffix after the file name.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology