Author Question: _________ techniques detect intrusion by observing events in the system and applying a set of rules ... (Read 91 times)

frankwu

  • Hero Member
  • *****
  • Posts: 549
_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
 
  What will be an ideal response?

Question 2

Which of the following offers the best definition of Authorization?
 
  A) The process of determining if a user is who he or she claims to be
  B) The process of assigning the permission to a validated user
  C) A set of step by step instructions for accomplishing a task
  D) None of the above



DylanD1323

  • Sr. Member
  • ****
  • Posts: 314
Answer to Question 1

Rule-based

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The effects of organophosphate poisoning are referred to by using the abbreviations “SLUD” or “SLUDGE,” It stands for: salivation, lacrimation, urination, defecation, GI upset, and emesis.

Did you know?

The Babylonians wrote numbers in a system that used 60 as the base value rather than the number 10. They did not have a symbol for "zero."

Did you know?

In 1864, the first barbiturate (barbituric acid) was synthesized.

Did you know?

The most common childhood diseases include croup, chickenpox, ear infections, flu, pneumonia, ringworm, respiratory syncytial virus, scabies, head lice, and asthma.

Did you know?

Egg cells are about the size of a grain of sand. They are formed inside of a female's ovaries before she is even born.

For a complete list of videos, visit our video library