When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is known as a:

A. Vulnerability
B. False negative
C. False positive
D. Threat vector

Answer: C. False positive

Computer Science & Information Technology

You might also like to view...

What is the first step a router takes when it receives an Ethernet frame?

A) It performs a lookup of the MAC address. B) It checks the integrity of the frame. C) It performs a lookup of the IP address. D) It determines whether the frame is unicast, multicast, or broadcast.

Computer Science & Information Technology

Standard web servers run on ports 80 or 443

Indicate whether the statement is true or false.

Computer Science & Information Technology