List of questions
Question 36 - CRISC discussion
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
A.
Logs and system events
B.
Intrusion detection system (IDS) rules
C.
Vulnerability assessment reports
D.
Penetration test reports
Your answer:
0 comments
Sorted by
Leave a comment first