Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

Which of the following systems monitors the operating system detecting inappropriate activity,
writing to log files, and triggering alarms?

Which of the following systems monitors the operating system detecting inappropriate activity,
writing to log files, and triggering alarms?

A.
Signature-Based ID system

B.
Host-based ID system

C.
Network-based ID system

D.
Behavior-based ID system

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *