Which of the following detection controls can be used to identify an unauthorized individual who acc seenagape 11 years ago Which of the following detection controls can be used to identify an unauthorized individual whoaccessed a remote network share? A.Obfuscation B.Authentication C.Log review D.LUN masking Explanation: ← Previous question Next question →