Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?

Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?

A.
Security logs

B.
Protocol analyzer

C.
Audit logs

D.
Honeypot



Leave a Reply 0

Your email address will not be published. Required fields are marked *