1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
3 years ago
7

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monito

red files.
Computers and Technology
1 answer:
Setler [38]3 years ago
4 0

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

You might be interested in
What does the Autosum feature on excel do?
BabaBlast [244]
The answer is 1. Pressing the Autosum button highlights the ten cells above it so that you can easily add things together. Hope this helps!
8 0
3 years ago
To what would you compare the transport layer?
GarryVolchara [31]
The above question has multiple choices as below

<span>A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.

</span>
4 0
3 years ago
While reading difficult content, you should always start witha.Surveying the chapterc.Reading the chapterb.Defining vocabulary w
katrin [286]
When reading difficult content you should- Survey the chapter.

Surveying the chapter allows you to better interpret the literary text and therefore be able to answer the following questions or summarize. 

Hope I helped,
-CSX :)
5 0
3 years ago
________ is the process of translating a task into a series of commands that a computer will use to perform the task.
IgorC [24]
Programming 
It can also be described as Reverse Engineering 
7 0
3 years ago
A common preprocessing step in many natural language processing tasks is text normalization, wherein words are converted to lowe
Arturiano [62]

Answer:

def normalize(text):

   text = text.lower()

   text = text.split()

   return text

Explanation:

The functiinfunction is provided with an input text when called upon, then it changes every character in the text into lower case and split each word with a space.

4 0
3 years ago
Other questions:
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Consider the following implementation of a class Square:
    12·1 answer
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • What is project scope? a. Quantifiable criteria that must be met for the project to be considered a success b. Products, service
    5·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
  • ..............................................................................
    8·1 answer
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!