A system security analyst wants to capture data flowing in and out of the enterprise. Which of the following would MOST likely help in achieving this goal?

A. Taking screenshots
B. Analyzing Big Data metadata
C. Analyzing network traffic and logs
D. Capturing system image

Answer: C. Analyzing network traffic and logs

Computer Science & Information Technology

You might also like to view...

Where does Windows store instructions temporarily after they are read from the hard disk drive?

A) read only memory B) random access memory C) free disk space D) cache

Computer Science & Information Technology

To add emphasis to a specific slice, ________, or pull out a pie chart slice

A) expand, B) move, C) explode, D) resize,

Computer Science & Information Technology