Which of the following can be used to detect a hacker who is stealing company data over port 80?
A. Web application scan
B. Threat intelligence
C. Log aggregation
D. Packet capture
A. Web application scan
B. Threat intelligence
C. Log aggregation
D. Packet capture