____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.

Fill in the blank(s) with the appropriate word(s).

System-monitoring

Computer Science & Information Technology

You might also like to view...

A server has been assigned a role of mail server. Which of the following services will be installed as a result of this selection?

A. SNMP B. SMTP C. TCP D. DHCP E. SFTP

Computer Science & Information Technology

Which of the following is NOT true about converting infix expressions to postfix expressions?

a. the operands always stay in the same order with respect to one another b. the operators always stay in the same order with respect to one another c. an operator will move only “to the right” with respect to the operands d. all parentheses are removed

Computer Science & Information Technology