Which of the following detection controls can be used to identify an unauthorized individual who acc seenagape 9 years ago Which of the following detection controls can be used to identify an unauthorized individual whoaccessed a remote network share? A.Obfuscation B.Authentication C.Log review D.LUN masking ← Previous question Next question →