CompTIA Exam Questions

Which of the following can Joe, a security administrator, implement on his network to capture attack

Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?

A.
Security logs

B.
Protocol analyzer

C.
Audit logs

D.
Honeypot

Explanation: