Which of the following would BEST allow an administrator to quickly find a rogue server on the network?
A.
Review security access logs
B.
A network mapper
C.
A protocol analyzer
D.
Review DNS logs
Which of the following would BEST allow an administrator to quickly find a rogue server on the network?
Which of the following would BEST allow an administrator to quickly find a rogue server on the network?
A.
Review security access logs
B.
A network mapper
C.
A protocol analyzer
D.
Review DNS logs