Tom is tuning his security monitoring tools in an attempt to reduce the number of alerts received by administrators without missing important security events. He decides to configure the system to only report failed login attempts if there are five failed attempts to access the same account within a one-hour period of time. What term best describes the technique that Tom is using?

A. Thresholding
B. Sampling
C. Account lockout
D. Clipping

Answer: D. Clipping

Computer Science & Information Technology

You might also like to view...

A zombie is another person's computer controlled by a hacker

Indicate whether the statement is true or false

Computer Science & Information Technology

Proportional typefaces are are more commonly used when character alignment must be precise

Indicate whether the statement is true or false

Computer Science & Information Technology