In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
Which of the following would be an indicator of the effectiveness of a computer security incident response team?