What can be used to gather evidence of network attacks?

What can be used to gather evidence of network attacks?

What can be used to gather evidence of network attacks?

A.
Access control lists (ACL)

B.
Intrusion-detection systems (IDS)

C.
Syslog reporting

D.
Antivirus programs

Explanation:
Intrusion-detection systems (IDS) are used to gather evidence of network attacks.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

thirteen − 7 =