A network administrator with a company’s NSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company’s physical
security, which of the following can the network administrator use to detect the presence of a malicious actor physically accessing the company’s network or
information systems from within? (Select TWO).
A.
RAS
B.
Vulnerability scanner
C.
HTTP intercept
D.
HIDS
E.
Port scanner
F.
Protocol analyzer