Which of the following would assist in intrusion detection?
A.
audit trails
B.
access control lists
C.
security clearances
D.
host-based authentication
Which of the following would assist in intrusion detection?
Which of the following would assist in intrusion detection?
A.
audit trails
B.
access control lists
C.
security clearances
D.
host-based authentication