______ is the identification of data that exceed a particular baseline value.
A) Anomaly detection
B) Real-time analysis
C) Thresholding
D) All of the above
Correct Answer:
Verified
Q21: RFC 2196 (Site Security Handbook) lists three
Q22: The audit _ are a permanent store
Q23: With _ the linking to shared library
Q24: Monitoring areas suggested in ISO 27002 include:
Q25: _ software is a centralized logging software
Q27: System conditions requiring immediate attention is a(n)
Q28: _ audit trails may be used to
Q29: Windows allows the system user to enable
Q30: _ is UNIX's general-purpose logging mechanism found
Q31: _ identifies the level of auditing, enumerates
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents