Author Question: _________ techniques detect intrusion by observing events in the system and applying a set of rules ... (Read 95 times)

frankwu

  • Hero Member
  • *****
  • Posts: 549
_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
 
  What will be an ideal response?

Question 2

Which of the following offers the best definition of Authorization?
 
  A) The process of determining if a user is who he or she claims to be
  B) The process of assigning the permission to a validated user
  C) A set of step by step instructions for accomplishing a task
  D) None of the above



DylanD1323

  • Sr. Member
  • ****
  • Posts: 314
Answer to Question 1

Rule-based

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

Did you know?

More than 2,500 barbiturates have been synthesized. At the height of their popularity, about 50 were marketed for human use.

Did you know?

Sildenafil (Viagra®) has two actions that may be of consequence in patients with heart disease. It can lower the blood pressure, and it can interact with nitrates. It should never be used in patients who are taking nitrates.

Did you know?

Studies show that systolic blood pressure can be significantly lowered by taking statins. In fact, the higher the patient's baseline blood pressure, the greater the effect of statins on his or her blood pressure.

Did you know?

Only 12 hours after an egg cell is fertilized by a sperm cell, the egg cell starts to divide. As it continues to divide, it moves along the fallopian tube toward the uterus at about 1 inch per day.

For a complete list of videos, visit our video library