__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A. NIDPSs
B. HIDPSs
C. AppIDPSs
D. SIDPSs

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following RAM amounts is the MINUMUM system requirement for Windows XP 32-bit?

A. 32MB B. 64MB C. 128MB D. 256MB

Computer Science & Information Technology

To find a value that is in an unordered array of 50 items, how many values must linear search examine on average?

A) 1 B) 6 C) 25 D) 50 E) 51

Computer Science & Information Technology