ISC Exam Questions

Which of the following is used to monitor network traffic or to monitor host audit logs in order to

Which of the following is used to monitor network traffic or to monitor host audit logs in order to
determine violations of security policy that have taken place?

A.
Intrusion Detection System

B.
Compliance Validation System

C.
Intrusion Management System

D.
)Compliance Monitoring System