A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A. Protocol analyzer
B. Bluesnarfing
C. Host routing table
D. HIDS
One Comment on “Which of the following could be used?”
ABtechsays:
One can think of a HIDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system’s security policy
One can think of a HIDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system’s security policy
0
0