Question

Which of the following activities are usually looked for using passive intrusion-detection tools?
a. Unusual or excessive e-mail traffic
b. Changes to security
c. Unplanned system shutdowns
d. Port scans
e. All of the above

Answer

This answer is hidden. It contains 1 characters.