Which of the following are designed to detect network attacks in progress and assist in post- attack forensics?
A. Intrusion Detection Systems
B. Audit trails
C. System logs
D. Tripwire
E. None of the choices.
A. Intrusion Detection Systems
B. Audit trails
C. System logs
D. Tripwire
E. None of the choices.