Kim, a technician, suspects an attacker has accessed the network. Which of the following would
BEST help confirm her theory?
A.
SNMP
B.
Traffic analysis
C.
Network sniffer
D.
System logs
Kim, a technician, suspects an attacker has accessed the network. Which of the following would
BEST help confirm her theory?
Kim, a technician, suspects an attacker has accessed the network. Which of the following would
BEST help confirm her theory?
A.
SNMP
B.
Traffic analysis
C.
Network sniffer
D.
System logs