Author Question: _________ techniques detect intrusion by observing events in the system and applying a set of rules ... (Read 54 times)

frankwu

  • Hero Member
  • *****
  • Posts: 549
_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
 
  What will be an ideal response?

Question 2

Which of the following offers the best definition of Authorization?
 
  A) The process of determining if a user is who he or she claims to be
  B) The process of assigning the permission to a validated user
  C) A set of step by step instructions for accomplishing a task
  D) None of the above



DylanD1323

  • Sr. Member
  • ****
  • Posts: 314
Answer to Question 1

Rule-based

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The tallest man ever known was Robert Wadlow, an American, who reached the height of 8 feet 11 inches. He died at age 26 years from an infection caused by the immense weight of his body (491 pounds) and the stress on his leg bones and muscles.

Did you know?

The senior population grows every year. Seniors older than 65 years of age now comprise more than 13% of the total population. However, women outlive men. In the 85-and-over age group, there are only 45 men to every 100 women.

Did you know?

There are over 65,000 known species of protozoa. About 10,000 species are parasitic.

Did you know?

To maintain good kidney function, you should drink at least 3 quarts of water daily. Water dilutes urine and helps prevent concentrations of salts and minerals that can lead to kidney stone formation. Chronic dehydration is a major contributor to the development of kidney stones.

Did you know?

Cancer has been around as long as humankind, but only in the second half of the twentieth century did the number of cancer cases explode.

For a complete list of videos, visit our video library