Audit-based intrusion detection depends on data in ____.
A. system files
B. memory
C. system logs
D. applications
Answer: C
Computer Science & Information Technology
You might also like to view...
External documentation:
a. Provides communication to the user. b. Is unnecessary. c. Provides communication and reminders to the programmer. d. None of the above.
Computer Science & Information Technology
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology