What can be used to gather evidence of network attacks?

Posted by: Pdfprep Category: CISA Tags: , ,

What can be used to gather evidence of network attacks?
A . Access control lists (ACL)
B . Intrusion-detection systems (IDS)
C . Syslog reporting
D . Antivirus programs

Answer: B

Explanation:

Intrusion-detection systems (IDS) are used to gather evidence of network attacks.

Leave a Reply

Your email address will not be published.