A corporation has experienced several media leaks of proprietary data on various web forums. The posts were made during business hours and it is believed that the culprit is posting during work hours from a corporate machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for later use in legal proceedings once the culprit is found. Which of the following provides the BEST solution?
A. Protocol analyzer
B. NIPS
C. Proxy server
D. HIDS
Answer: A. Protocol analyzer
Computer Science & Information Technology
You might also like to view...
If there is no loss of efficiency in importing an entire Java package instead of importing only classes you use into your program, why would you not just import the entire package?
What will be an ideal response?
Computer Science & Information Technology
In VBA, the ________ structure repeats a loop a specific number of times
A) Do...Loop B) For...Next C) If...Then D) If...Then...Else
Computer Science & Information Technology
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Describe Internet filtering and its various uses.
What will be an ideal response?
Computer Science & Information Technology