Question

Which method is most likely to detect unauthorized access to the system?
a. message transaction log
b. data encryption standard
c. vertical parity check
d. request-response technique

Answer

This answer is hidden. It contains 1 characters.