12.Which one of the following intrusion detection systems makes use of an expert system to detect anomalous user activity?
A.PIX
B.IDIOT
C.AAFID
D.NIDES
13.For what type of information system security accreditation are the applications and systems at
a specific, self-contained location evaluated?
A.System accreditation
B.Site accreditation
C.Application accreditation
D.Type accreditation
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here