A ________ is a shape that can be used to point to information or to connect shapes on a slide
A) callout B) vertex C) selection net D) line
D
You might also like to view...
When naming a macro, the first character of the macro name must be a(n) ________
A) cell reference B) letter C) underscore D) number
Answer the following statements true (T) or false (F)
1. The IDS component responsible for collecting data is the user interface. 2. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. 3. The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts. 4. Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior. 5. Anomaly detection is effective against misfeasors.