Which of the following is considered by some HIDS tools to detect system security related
anomalies?
A.
Patch reports
B.
File hashing snapshot comparison
C.
Vulnerability analysis snapshot comparison
D.
Virus signature reports
Which of the following is considered by some HIDS tools to detect system security related
anomalies?
Which of the following is considered by some HIDS tools to detect system security related
anomalies?
A.
Patch reports
B.
File hashing snapshot comparison
C.
Vulnerability analysis snapshot comparison
D.
Virus signature reports