88) Threat monitoring technique is
Answer is:
both 1) the system can check for suspicious patterns of activity in an attempt to detect a security violation and 2) a time sharing a system that counts the number of incorrect passwords given
Related Operating System MCQ with Answers
Answer is:
both 1) could be included in a compiler and 2) pose a difficult problem because, to detect them
Answer is:
both 1) is a process that uses the spawn mechanism to clobber system performance and 2) spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.
Answer is:
all of these
Explanation:
An audit log
* simply records the time
* user
* type of all access to an object