A network administrator with a company’s NSP has received a CERT alert for targeted adversarial
behavior at the company. In addition to the company’s physical security, which of the following can
the network administrator use to scan and detect the presence of a malicious actor physically
accessing the company’s network or information systems from within? (Select TWO).
A.
RAS
B.
Vulnerability scanner
C.
HTTP intercept
D.
HIDS
E.
Port scanner
F.
Protocol analyzer