Audit-based intrusion detection depends on data in ____.

A. system files
B. memory
C. system logs
D. applications

Answer: C

Computer Science & Information Technology

You might also like to view...

External documentation:

a. Provides communication to the user. b. Is unnecessary. c. Provides communication and reminders to the programmer. d. None of the above.

Computer Science & Information Technology

Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology