Which of the following could be used?

A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?

A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?

A.
Protocol analyzer

B.
Bluesnarfing

C.
Host routing table

D.
HIDS



Leave a Reply 0

Your email address will not be published. Required fields are marked *