What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the security admin if an attack were presently taking place?
A. 3
B. 6
C. 7
D. 8
E. 11
One Comment on “What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the se”
I choose C