After a breach, a company has decided to implement a solution to better understand the technique used by the attackers.
Which of the following is the BEST solution to be deployed?
A . Network analyzer
B . Protocol analyzer
C . Honeypot network
D . Configuration compliance scanner
Answer: B
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund