Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

A.
Spam filter

B.
IDS

C.
Firewall

D.
Malware inspection



Leave a Reply 0

Your email address will not be published. Required fields are marked *