Which of the following could be used?

A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?

A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?

A.
Protocol analyzer

B.
Bluesnarfing

C.
Host routing table

D.
HIDS



Leave a Reply 1

Your email address will not be published. Required fields are marked *


ABtech

ABtech

One can think of a HIDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system’s security policy