__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
A. NIDPSs
B. HIDPSs
C. AppIDPSs
D. SIDPSs
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following RAM amounts is the MINUMUM system requirement for Windows XP 32-bit?
A. 32MB B. 64MB C. 128MB D. 256MB
Computer Science & Information Technology
To find a value that is in an unordered array of 50 items, how many values must linear search examine on average?
A) 1 B) 6 C) 25 D) 50 E) 51
Computer Science & Information Technology