Which of the following are designed to detect network attacks in progress and assist in post-attack forensics?

Which of the following are designed to detect network attacks in progress and assist in post-attack forensics?
A. Intrusion Detection Systems
B. Audit trails
C. System logs
D. Tripwire
E. None of the choices.

How To Pass CISA Exam?

Isaca CISA PDF dumps.

High quality CISA PDF and software. VALID exam to help you pass.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.