Threat monitoring technique is
A. | the system can check for suspicious patterns of activity in an attempt to detect a security violation |
B. | a time sharing a system that counts the number of incorrect passwords given |
C. | both (a) and (b) |
D. | none of these |
Answer : C Explanation : |
|
Option: A Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. |