Tom is tuning his security monitoring tools in an attempt to reduce the number of alerts received by administrators without missing important security events. He decides to configure the system to only report failed login attempts if there are five failed attempts to access the same account within a one-hour period of time. What term best describes the technique that Tom is using?
A. Thresholding
B. Sampling
C. Account lockout
D. Clipping
Answer: D. Clipping
Computer Science & Information Technology
You might also like to view...
A zombie is another person's computer controlled by a hacker
Indicate whether the statement is true or false
Computer Science & Information Technology
Proportional typefaces are are more commonly used when character alignment must be precise
Indicate whether the statement is true or false
Computer Science & Information Technology