A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A.
Protocol analyzer
B.
Bluesnarfing
C.
Host routing table
D.
HIDS
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
A.
Protocol analyzer
B.
Bluesnarfing
C.
Host routing table
D.
HIDS
One can think of a HIDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system’s security policy