Which of the following tools BEST identifies the method an attacker used after they have entered into a network?

Which of the following tools BEST identifies the method an attacker used after they have entered into a network?









A. Input validation
B. NIDS
C. Port scanner
D. HIDS






Answer: B


Computer Science

Learn More Multiple Choice Question :