Which of the following is used to monitor network traffic or to monitor host audit logs in order to determine violations of security policy that have taken place?

Which of the following is used to monitor network traffic or to monitor host audit logs in order to
determine violations of security policy that have taken place?

Which of the following is used to monitor network traffic or to monitor host audit logs in order to
determine violations of security policy that have taken place?

A.
Intrusion Detection System

B.
Compliance Validation System

C.
Intrusion Management System

D.
)Compliance Monitoring System



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × 2 =