Which of the following is being implemented by Jane’s company?

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Jane’s company?

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Jane’s company?

A.
Vulnerability scanner

B.
Honeynet

C.
Protocol analyzer

D.
Port scanner



Leave a Reply 0

Your email address will not be published. Required fields are marked *