Multiple Choice
This creates logs of network traffic that was permitted to pass the firewall.
A) Intrusion detection system
B) Log analysis
C) Penetration test
D) Vulnerability scan
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: In recent years,many of the attacks carried
Q4: Which of the following is an example
Q7: The most effective way to protect network
Q10: All employees of E.C.Hoxy are required to
Q11: Restricting access of users to specific portions
Q19: The Trust Services Framework reliability principle that
Q28: Describe the function of a computer incident
Q35: Which of the following is commonly true
Q62: A special purpose hardware device or software
Q69: Perimeter defense is an example of which