____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.
A) System-monitoring
B) User-analysis
C) Network analysis
D) Log-analysis
Correct Answer:
Verified
Q5: How one approaches incident detection can seriously
Q6: The most common incidents that affect network
Q7: This type of incident means an attacker
Q8: _ attacks send a large quantity of
Q9: _ attacks send input data of a
Q11: A(n) _ in a computer-security environment is
Q12: _ is the most basic form of
Q13: _ tools monitor the events of attacks
Q14: In UNIX and Linux, _ is a
Q15: The chief difference between a worm and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents