CISA Certified Information Systems Auditor – Question2446

What can be used to gather evidence of network attacks?

A.
Access control lists (ACL)
B. Intrusion-detection systems (IDS)
C. Syslog reporting
D. Antivirus programs

Correct Answer: B

Explanation:

Explanation:
Intrusion-detection systems (IDS) are used to gather evidence of network attacks.