Executable profiling and threshold monitoring are examples of which of the following?

a. Preemptive blocking
b. Infiltration
c. Anomaly detection
d. Sniffing

ANS: C

Computer Science & Information Technology

You might also like to view...

?In a denial-of-service (DDoS) attack, the perpetrator ____.

A. instructs the zombie computers to send simple access requests to target computers B. ?sends out a huge number of spam emails to all of those in your contacts list C. changes the configuration information of the infected computers D. ?refuses to accept any email from any sender

Computer Science & Information Technology

You can create ____ style rules to easily update like page elements, such as the masthead or footer on all pages at once.

A. class-based B. element-based C. ID-based D. none of the above

Computer Science & Information Technology