Which of the following log analysis techniques compares the log entries against a set of known bad activity?
A) Trend analysis
B) Signature analysis
C) Correlation analysis
D) Sequencing analysis
B) Signature analysis
Computer Science & Information Technology
You might also like to view...
Which of the following will run the compiled program called ReadIt?
a. java ReadIt.java b. java ReadIt c. run ReadIt d. go ReadIt
Computer Science & Information Technology
The ____________________ is a unique number representing the username.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology