Cryptography MCSY0-401Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?
Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?
Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?
A. Security logs
B. Protocol analyzer
C. Audit logs
D. Honeypot