PdfPrep.com

What can be used to gather evidence of network attacks?

What can be used to gather evidence of network attacks?
A . Access control lists (ACL)
B . Intrusion-detection systems (IDS)
C . Syslog reporting
D . Antivirus programs

Answer: B

Explanation:

Intrusion-detection systems (IDS) are used to gather evidence of network attacks.

Exit mobile version