ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 292 - 312-38 discussion

Report
Export

Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

A.
Signature-Based ID system
Answers
A.
Signature-Based ID system
B.
Host-based ID system
Answers
B.
Host-based ID system
C.
Network-based ID system
Answers
C.
Network-based ID system
D.
Behavior-based ID system
Answers
D.
Behavior-based ID system
Suggested answer: B
asked 18/09/2024
Arslan Sheik
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first