Which of the following log analysis techniques compares the log entries against a set of known bad activity?

A) Trend analysis
B) Signature analysis
C) Correlation analysis
D) Sequencing analysis

B) Signature analysis

Computer Science & Information Technology

You might also like to view...

Which of the following will run the compiled program called ReadIt?

a. java ReadIt.java b. java ReadIt c. run ReadIt d. go ReadIt

Computer Science & Information Technology

The ____________________ is a unique number representing the username.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology