Top Posters
Since Sunday
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
r
4
New Topic  
barry barry
wrote...
Posts: 11630
9 years ago
This creates logs of network traffic that was permitted to pass the firewall.
A) Intrusion detection system
B) Log analysis
C) Penetration test
D) Vulnerability scan
Read 253 times
1 Reply
Replies
Answer accepted by topic starter
newstartnewstart
wrote...
Top Poster
Posts: 6345
9 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  947 People Browsing
Related Images
  
 492
  
 5638
  
 288