Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?
Which of the following is placed in promiscuous mode, according to the data flow, to permit a NIDS to monitor the traffic?
Which security policy will be most likely used while attempting to mitigate the risks involved with allowing a user to access company email via their cell phone?