A system security analyst wants to capture data flowing in and out of the enterprise. Which of the following would MOST likely help in achieving this goal?
A. Taking screenshots
B. Analyzing Big Data metadata
C. Analyzing network traffic and logs
D. Capturing system image
Answer: C. Analyzing network traffic and logs
Computer Science & Information Technology
You might also like to view...
Where does Windows store instructions temporarily after they are read from the hard disk drive?
A) read only memory B) random access memory C) free disk space D) cache
Computer Science & Information Technology
To add emphasis to a specific slice, ________, or pull out a pie chart slice
A) expand, B) move, C) explode, D) resize,
Computer Science & Information Technology