Prev Question
Next Question

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

A. Antivirus

B. Firewall

C. Audit logs

D. IDS

Explanation:

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *