What can be used to gather evidence of network attacks?
A. Access control lists (ACL)
B. Intrusion-detection systems (IDS)
C. Syslog reporting
D. Antivirus programs
Explanation:
Intrusion-detection systems (IDS) are used to gather evidence of network attacks.