ECCouncil Exam Questions

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?

A.
Snort 2.1.0

B.
WIDS

C.
NFR security

D.
LogIDS 1.0

Explanation: