Operating System

1:

Threat monitoring technique is

A.

the system can check for suspicious patterns of activity in an attempt to detect a security violation

B.

a time sharing a system that counts the number of incorrect passwords given

C.

both (a) and (b)

D.

none of these

 

Answer : C

Explanation :

Write your comments here:


Report Error
 

Option: A

Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here.