Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?
A.
Obfuscation
B.
Authentication
C.
Log review
D.
LUN masking
Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?
Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?
A.
Obfuscation
B.
Authentication
C.
Log review
D.
LUN masking