__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
A. Profile based detection B. Signature detection
C. Threshold detection D. Anomaly detection
B. Signature detection
You might also like to view...
Which of the following statements are correct to invoke the printMax method in Listing 7.5 in the textbook?
a. printMax(1, 2, 2, 1, 4); b. printMax(new double[]{1, 2, 3}); c. printMax(1.0, 2.0, 2.0, 1.0, 4.0); d. printMax(new int[]{1, 2, 3});
?Critical Thinking QuestionsCase 4-1 ? John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder. As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of documenting the results of the JAD session and preparing the report that will be sent to JAD team members?
A. Clark B. Tom C. Linda D. His own