Which of the following is an example of a Denial-of-Service internal control?
A) Employ malicious code protection mechanisms at information system entry and exit points.
B) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
C) Monitor system resources to determine if sufficient resources exist to prevent effective attacks.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
Correct Answer:
Verified
Q74: A business can protect itself from DoS
Q75: A business can protect itself from DoS
Q76: A business can protect itself from DoS
Q77: Which of the following is an example
Q78: Which of the following is an example
Q80: What is an attack that uses destructive
Q81: What is a Malware attack?
A) An attack
Q82: Which of the following is an example
Q83: Which of the following is an example
Q84: Which of the following is an example
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents