When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is
known as a:
A.
Vulnerability
B.
False negative
C.
False positive
D.
Threat vector
When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is
known as a:
When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is
known as a:
A.
Vulnerability
B.
False negative
C.
False positive
D.
Threat vector