List of questions
Related questions
Question 215 - H12-711 discussion
The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?
A.
Impersonate another user
B.
The administrator deletes the configuration by mistake
C.
Planting worm Trojans
D.
leak data
Your answer:
0 comments
Sorted by
Leave a comment first