Which of the following could be reviewed on devices to help determine whether unauthorized
access has occurred?
A.
Antivirus
B.
Firewall
C.
Audit logs
D.
IDS
Which of the following could be reviewed on devices to help determine whether unauthorized
access has occurred?
Which of the following could be reviewed on devices to help determine whether unauthorized
access has occurred?
A.
Antivirus
B.
Firewall
C.
Audit logs
D.
IDS