another lates cs507 paper by Noureen
Q: Give any two examples to prove that Audit trails help to provide variants from normal behavior which may lead to unauthorized usage of resources?
Q: what are the types of IDS?
Q: Define the attributes and methods?
Q: what is Reusable software?
Q: define centralized processing?
Q: list down the inputs of likelihood determination?
Q: What are Active monitors? Define
Q: What is access control? Give example
Some questions are new ones
--
●●Gяєу_Fєяяy ●●
--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en
No comments:
Post a Comment
PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE
Note: Only a member of this blog may post a comment.