Author Question: _________ techniques detect intrusion by observing events in the system and applying a set of rules ... (Read 104 times)

frankwu

  • Hero Member
  • *****
  • Posts: 549
_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
 
  What will be an ideal response?

Question 2

Which of the following offers the best definition of Authorization?
 
  A) The process of determining if a user is who he or she claims to be
  B) The process of assigning the permission to a validated user
  C) A set of step by step instructions for accomplishing a task
  D) None of the above



DylanD1323

  • Sr. Member
  • ****
  • Posts: 314
Answer to Question 1

Rule-based

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

To maintain good kidney function, you should drink at least 3 quarts of water daily. Water dilutes urine and helps prevent concentrations of salts and minerals that can lead to kidney stone formation. Chronic dehydration is a major contributor to the development of kidney stones.

Did you know?

The types of cancer that alpha interferons are used to treat include hairy cell leukemia, melanoma, follicular non-Hodgkin's lymphoma, and AIDS-related Kaposi's sarcoma.

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

In Eastern Europe and Russia, interferon is administered intranasally in varied doses for the common cold and influenza. It is claimed that this treatment can lower the risk of infection by as much as 60–70%.

Did you know?

The modern decimal position system was the invention of the Hindus (around 800 AD), involving the placing of numerals to indicate their value (units, tens, hundreds, and so on).

For a complete list of videos, visit our video library