Which of the following is considered by some HIDS tools to detect system security related anomalies?

Which of the following is considered by some HIDS tools to detect system security related
anomalies?

Which of the following is considered by some HIDS tools to detect system security related
anomalies?

A.
Patch reports

B.
File hashing snapshot comparison

C.
Vulnerability analysis snapshot comparison

D.
Virus signature reports



Leave a Reply 0

Your email address will not be published. Required fields are marked *