When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is known as a:
A. Vulnerability
B. False negative
C. False positive
D. Threat vector
Answer: C. False positive
Computer Science & Information Technology
You might also like to view...
What is the first step a router takes when it receives an Ethernet frame?
A) It performs a lookup of the MAC address. B) It checks the integrity of the frame. C) It performs a lookup of the IP address. D) It determines whether the frame is unicast, multicast, or broadcast.
Computer Science & Information Technology
Standard web servers run on ports 80 or 443
Indicate whether the statement is true or false.
Computer Science & Information Technology