Executable profiling and threshold monitoring are examples of which of the following?
a. Preemptive blocking
b. Infiltration
c. Anomaly detection
d. Sniffing
ANS: C
Computer Science & Information Technology
You might also like to view...
?In a denial-of-service (DDoS) attack, the perpetrator ____.
A. instructs the zombie computers to send simple access requests to target computers B. ?sends out a huge number of spam emails to all of those in your contacts list C. changes the configuration information of the infected computers D. ?refuses to accept any email from any sender
Computer Science & Information Technology
You can create ____ style rules to easily update like page elements, such as the masthead or footer on all pages at once.
A. class-based B. element-based C. ID-based D. none of the above
Computer Science & Information Technology