1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
7

Which threat hunting technique is best suitable when handling datasets that creates limited number of results

Computers and Technology
1 answer:
Pepsi [2]3 years ago
3 0

Answer:

Stacking

Explanation:

Threat hunting is searching through networks and datasets to see if their are suspicious or activities that are risky.

Stacking has to do with counting the frequency the frequency of occurrences for those values that are of o particular type. And then making an analysis) examination of the outliers of these results.

When the dataset is large or diverse, the effectiveness of the stacking technique reduces. It is best used with datasets that would give a finite number of results.

You might be interested in
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit,
Inga [223]

Answer:

In terms of efficient use of memory: Best-fit is the best (it still have a free memory space of 777KB and all process is completely assigned) followed by First-fit (which have free space of 777KB but available in smaller partition) and then worst-fit (which have free space of 1152KB but a process cannot be assigned). See the detail in the explanation section.

Explanation:

We have six free memory partition: 300KB (F1), 600KB (F2), 350KB (F3), 200KB (F4), 750KB (F5) and 125KB (F6) (in order).

Using First-fit

First-fit means you assign the first available memory that can fit a process to it.

  • 115KB will fit into the first partition. So, F1 will have a remaining free space of 185KB (300 - 115).
  • 500KB will fit into the second partition. So, F2 will have a remaining free space of  100KB (600 - 500)
  • 358KB will fit into the fifth partition. So, F5 will have a remaining free space of 392KB (750 - 358)
  • 200KB will fit into the third partition. So, F3 will have a remaining free space of 150KB (350 -200)
  • 375KB will fit into the remaining partition of F5. So, F5 will a remaining free space of 17KB (392 - 375)

Using Best-fit

Best-fit means you assign the best memory available that can fit a process to the process.

  • 115KB will best fit into the last partition (F6). So, F6 will now have a free remaining space of 10KB (125 - 115)
  • 500KB will best fit into second partition. So, F2 will now have a free remaining space of 100KB (600 - 500)
  • 358KB will best fit into the fifth partition. So, F5 will now have a free remaining space of 392KB (750 - 358)
  • 200KB will best fit into the fourth partition and it will occupy the entire space with no remaining space (200 - 200 = 0)
  • 375KB will best fit into the remaining space of the fifth partition. So, F5 will now have a free space of 17KB (392 - 375)

Using Worst-fit

Worst-fit means that you assign the largest available memory space to a process.

  • 115KB will be fitted into the fifth partition. So, F5 will now have a free remaining space of 635KB (750 - 115)
  • 500KB will be fitted also into the remaining space of the fifth partition. So, F5 will now have a free remaining space of 135KB (635 - 500)
  • 358KB will be fitted into the second partition. So, F2 will now have a free remaining space of 242KB (600 - 358)
  • 200KB will be fitted into the third partition. So, F3 will now have a free remaining space of 150KB (350 - 200)
  • 375KB will not be assigned to any available memory space because none of the available space can contain the 375KB process.
8 0
3 years ago
What is the best way to learn python?
iren [92.7K]

Stage 1: Basic Language

Stage 2: Problem Solving

Stage 3: Pick a Small Project, and Build a Program

Stage 4: Learn Github

7 0
4 years ago
A computer cannot store the data and information for your future use true or false​
baherus [9]
The answer would be false
8 0
3 years ago
In the current situation, how do you access information as a student? How will you integrate the use of ICT in your daily life a
3241004551 [841]

Answer:

Explanation:

As a computer science student information is accessed in every possible way. This can be through a local school lan network, mobile devices, e-mail, etc. All of these help information flow to and from various people and makes obtaining this information incredibly simple as a student. Especially in the field of computer science, I need to integrate as many ICT devices with me in my everyday life, to send emails, check calendar updates, research information on the web, check school reports, and even speak with clients.

3 0
3 years ago
Write a method , getemailusername, that is passed a string argument that is an email address and returns the user-name part. so
MissTica
<span>public String getemailssername (String aUser) { return aUser.substring(0, aUser.indexOf("@")); }</span>
4 0
3 years ago
Other questions:
  • ____________________ memory is the ability to add RAM without shutting down the computer or operating system.
    13·1 answer
  • Which term is used to describe bitmap images
    8·2 answers
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • What message do you want to share with a wide audience
    7·1 answer
  • PLEASE HELP QUICK WILL GIVE BRAINLY
    6·1 answer
  • After running this Assembly language program below, give the final values in EAX, EBX, and ECX. MOV EAX, AAAAAAAA MOV EBX, BBBBB
    7·2 answers
  • When spraying pesticide wear and protective eyeglass​
    13·2 answers
  • What are the characteristics of the Outlook Rules Wizard? Check all that apply.
    6·1 answer
  • Write a pseudocode for the logic of a program that accepts five numbers from a user and displays one of the following messages:-
    8·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!