____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.
Fill in the blank(s) with the appropriate word(s).
System-monitoring
Computer Science & Information Technology
You might also like to view...
A server has been assigned a role of mail server. Which of the following services will be installed as a result of this selection?
A. SNMP B. SMTP C. TCP D. DHCP E. SFTP
Computer Science & Information Technology
Which of the following is NOT true about converting infix expressions to postfix expressions?
a. the operands always stay in the same order with respect to one another b. the operators always stay in the same order with respect to one another c. an operator will move only “to the right” with respect to the operands d. all parentheses are removed
Computer Science & Information Technology