Individual systems involved in policy or security violations or incidents, according to the security manager, cannot be located easily. The security manager notes that all the host names seem to be aimlessly created characters. Choose the BEST to help the security manager in determining systems involved in security incidents?
Comments