Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?
A.
Security logs
B.
Protocol analyzer
C.
Audit logs
D.
Honeypot
Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?
Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?
A.
Security logs
B.
Protocol analyzer
C.
Audit logs
D.
Honeypot