The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.

A. event discriminator B. audit analyzer

C. archive D. alarm processor

A. event discriminator

Computer Science & Information Technology

You might also like to view...

All Excel formulas begin with ________

A) @ B) # C) = D) *

Computer Science & Information Technology

File _________________________ are identified by a three- or four-letter suffix after the file name.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology