To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?
A. Port scanner
B. Network analyzer
C. IPS
D. Audit Logs
Answer: B. Network analyzer
Computer Science & Information Technology
You might also like to view...
How do you insert a button to run a macro in a worksheet?
A) Use the Button Builder on the Code group B) You must use VBA code to do this. C) Add a Form Control button that runs the macro D) The button has to be inserted on the Quick Access Toolbar.
Computer Science & Information Technology
In Windows 8.1 the Backup and Restore applet in the Control Panel enables easy configuration of backup options
Indicate whether the statement is true or false
Computer Science & Information Technology