A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called

A) log analysis.
B) intrusion detection systems.
C) continuous monitoring.
D) defense in depth.

Answer: B

Business

You might also like to view...

Describe the primary storage used in computer systems

What will be an ideal response?

Business

Which of the following is a purpose of document dumping?

A) to get rid of unnecessary and outdated documents and retain only those documents that are relevant B) to conceal relevant and vital information from being tracked by the forensic accountants C) to destroy material documents that contain important data D) to make the document of interest more difficult to identify

Business