Which of the following is not an element observed in STROBE?

A) office location
B) desk placement
C) office lighting
D) desk chair fabric

D) desk chair fabric

Computer Science & Information Technology

You might also like to view...

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

A. Profile based detection B. Signature detection C. Threshold detection D. Anomaly detection

Computer Science & Information Technology

________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology