Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?
A.
Snort 2.1.0
B.
WIDS
C.
NFR security
D.
LogIDS 1.0
Explanation:
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?
A.
Snort 2.1.0
B.
WIDS
C.
NFR security
D.
LogIDS 1.0
Explanation: