GIAC GCIA Question Answer
Which of the following can be monitored by using the host-based intrusion detection system (HIDS)?
Computer performance
File system integrity
Computer storage space
DoS attack
TESTED 15 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved