To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?

A. Port scanner
B. Network analyzer
C. IPS
D. Audit Logs

Answer: B. Network analyzer

Computer Science & Information Technology

You might also like to view...

How do you insert a button to run a macro in a worksheet?

A) Use the Button Builder on the Code group B) You must use VBA code to do this. C) Add a Form Control button that runs the macro D) The button has to be inserted on the Quick Access Toolbar.

Computer Science & Information Technology

In Windows 8.1 the Backup and Restore applet in the Control Panel enables easy configuration of backup options

Indicate whether the statement is true or false

Computer Science & Information Technology