Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?

Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?

Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?

A.
Obfuscation

B.
Authentication

C.
Log review

D.
LUN masking

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *