Which of the following are designed to detect network attacks in progress and assist in post-attack forensics?
A. Intrusion Detection Systems
B. Audit trails
C. System logs
D. Tripwire
E. None of the choices.
Which of the following are designed to detect network attacks in progress and assist in post-attack forensics?
A. Intrusion Detection Systems
B. Audit trails
C. System logs
D. Tripwire
E. None of the choices.