A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A.
Protocol analyzer
B.
Bluesnarfing
C.
Host routing table
D.
HIDS
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A.
Protocol analyzer
B.
Bluesnarfing
C.
Host routing table
D.
HIDS