Which of the following is an example of threshold monitoring?

a. Detecting a threat and blocking the IP address of the intruder
b. Infiltrating hacker online groups
c. Monitoring failed login attempts
d. Monitoring how programs use system resources

ANS: C

Computer Science & Information Technology

You might also like to view...

Match the following standard graphic file formats with their description

I. GIF II. JPG III. PNG IV. BMP V. TIF A. Best suited for web use only B. Developed for Microsoft Windows C. A lossless graphic format used in publishing D. A graphic format that can store up to 16.7 million colors E. A 256-color graphic file format that uses lossless compression

Computer Science & Information Technology

After an employee connected a switch port of a home router to the wall jack in the office, other employees in the office started losing connectivity. Which of the following can be implemented on the company switch to prevent loss of connectivity in the future?

A. Loop prevention B. ARP inspections C. DHCP snooping D. MAC address filtering

Computer Science & Information Technology