List of questions
Related questions
Question 290 - SY0-601 discussion
Which of the following can be used to detect a hacker who is stealing company data over port 80?
A.
Web application scan
B.
Threat intelligence
C.
Log aggregation
D.
Packet capture
Your answer:
0 comments
Sorted by
Leave a comment first