Since system intrusions take place over a very short period of time, there is no need to maintain IDPS log data for more than a few hours.

Answer the following statement true (T) or false (F)

False

Computer Science & Information Technology

You might also like to view...

Which of the following is considered a backup rotation scheme?

A. full/incremental backup B. grandfather/father/son C. full/differential backup D. copy backup

Computer Science & Information Technology

A technician is called in to troubleshoot a four-disk RAID 10 array on a high-end Windows 7 Enterprise Workstation. One drive has failed. Which of the following should the technician do to fix the problem?

a. Reset the drive and verify the RAID array is healthy b. Add a fifth drive and make it a spare c. Replace the failed drive and power down the RAID d. Replace the failed drive and make sure the RAID rebuilds successfully

Computer Science & Information Technology