While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as "unknown" and does not appear to be within the bounds of the organizations Acceptable Use Policy.Which of the following tool or technology would work BEST for obtaining more information on this traffic?

A. Firewall logs
B. IDS logs
C. Increased spam filtering
D. Protocol analyzer

Answer: B. IDS logs

Computer Science & Information Technology

You might also like to view...

Name the five descriptive properties associated with each data variable in C++.

What will be an ideal response?

Computer Science & Information Technology

Which statement describing overloaded functions is false?

A. The return type can be the only difference. B. Each function has its own function prototype. C. Functions can have different input types. D. Functions can have different numbers of input parameters.

Computer Science & Information Technology