List of questions
Question 51 - CRISC discussion
Which of the following would BEST help to ensure that suspicious network activity is identified?
A.
Analyzing intrusion detection system (IDS) logs
B.
Analyzing server logs
C.
Using a third-party monitoring provider
D.
Coordinating events with appropriate agencies
Your answer:
0 comments
Sorted by
Leave a comment first