A system security analyst wants to capture data flowing in and out of the enterprise. Which of the following would MOST likely help in achieving this goal?

A. Taking screenshots
B. Analyzing Big Data metadata
C. Analyzing network traffic and logs
D. Capturing system image


Answer: C. Analyzing network traffic and logs

Computer Science & Information Technology

You might also like to view...

A __________ is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application, such as applying a block cipher to a sequence of data blocks or a data stream.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Graphical elements increase ____.

A. mood B. apprehension C. feelings D. visual literacy

Computer Science & Information Technology

________ includes rules that determine what can and cannot be entered in specific cells

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Cisco IOS command is used to configure a new TACACS+ server on a device?

A) aaa server mode tacacs+ server-name B) aaa server tacacs+ server-name C) aaa new server tacacs server-name D) tacacs server server-name

Computer Science & Information Technology