Which of the following options is capable of detecting malicious activity on a single machine, but will not attempt to stop said activity?
Network Architecture | |
Network operations | |
Network security | |
Troubleshooting | |
Industry standards, practices, and network theory |