Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?

Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?

Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?

A.
HIDS

B.
HIPS

C.
NIPS

D.
NIDS



Leave a Reply 0

Your email address will not be published. Required fields are marked *