Since system intrusions take place over a very short period of time, there is no need to maintain IDPS log data for more than a few hours.
Answer the following statement true (T) or false (F)
False
Computer Science & Information Technology
You might also like to view...
Which of the following is considered a backup rotation scheme?
A. full/incremental backup B. grandfather/father/son C. full/differential backup D. copy backup
Computer Science & Information Technology
A technician is called in to troubleshoot a four-disk RAID 10 array on a high-end Windows 7 Enterprise Workstation. One drive has failed. Which of the following should the technician do to fix the problem?
a. Reset the drive and verify the RAID array is healthy b. Add a fifth drive and make it a spare c. Replace the failed drive and power down the RAID d. Replace the failed drive and make sure the RAID rebuilds successfully
Computer Science & Information Technology