Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?

A.
Snort 2.1.0

B.
WIDS

C.
NFR security

D.
LogIDS 1.0

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *