List of questions
Related questions
Question 292 - 312-38 discussion
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
A.
Signature-Based ID system
B.
Host-based ID system
C.
Network-based ID system
D.
Behavior-based ID system
Your answer:
0 comments
Sorted by
Leave a comment first