What can be deployed to intercept and log network traffic passing through the network?
event viewers
NIDSs
protocol analyzers
proxy catchers
NIPSs
Answer :
Protocol Analyzers.
event viewers
NIDSs
protocol analyzers
proxy catchers
NIPSs
Answer :
Protocol Analyzers.