Which of the following are designed to detect network attacks in progress and assist in post-attack forensics?
A.
Intrusion Detection Systems
B.
Audit trails
C.
System logs
D.
Tripwire
E.
None of the choices.
Explanation:
Intrusion Detection Systems are designed to detect network attacks in progress and assist in post-attack
forensics, while audit trails and logs serve a similar function for individual systems.