Which of the following is not an element observed in STROBE?
A) office location
B) desk placement
C) office lighting
D) desk chair fabric
D) desk chair fabric
Computer Science & Information Technology
You might also like to view...
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
A. Profile based detection B. Signature detection C. Threshold detection D. Anomaly detection
Computer Science & Information Technology
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology