Which of the following is a type of anomaly detection that measures the system-wide use of resources to develop a profile of that usage?

A) Infiltration
B) Preemptive blocking
C) Resource profiling
D) Threshold monitoring

C) Resource profiling

Computer Science & Information Technology

You might also like to view...

How does Indent to Here work?

What will be an ideal response?

Computer Science & Information Technology

On disk, data are recorded on concentric circles called __________.

a. blocks b. sectors c. tracks d. cylinders

Computer Science & Information Technology