CompTIA Exam Questions

Which of the following detection controls can be used to identify an unauthorized individual who acc

Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?

A.
Obfuscation

B.
Authentication

C.
Log review

D.
LUN masking