What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the security admin if an attack were presently taking place?
A.
3
B.
6
C.
7
D.
8
E.
11
You must be logged in to post a comment.
I choose C