Which of the following detection controls can be used to identify an unauthorized individual who acc seenagape 10 years ago Which of the following detection controls can be used to identify an unauthorized individual whoaccessed a remote network share? A.Obfuscation B.Authentication C.Log review D.LUN masking ← Previous question Next question →