A corporation has experienced several media leaks of proprietary data on various web forums. The posts were made during business hours and it is believed that the culprit is posting during work hours from a corporate machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for later use in legal proceedings once the culprit is found. Which of the following provides the BEST solution?

A. Protocol analyzer
B. NIPS
C. Proxy server
D. HIDS


Answer: A. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

If there is no loss of efficiency in importing an entire Java package instead of importing only classes you use into your program, why would you not just import the entire package?

What will be an ideal response?

Computer Science & Information Technology

In VBA, the ________ structure repeats a loop a specific number of times

A) Do...Loop B) For...Next C) If...Then D) If...Then...Else

Computer Science & Information Technology

In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe Internet filtering and its various uses.

What will be an ideal response?

Computer Science & Information Technology