Keith, a network administrator, has been asked to passively monitor network traffic for potential malicious activities to the company's sales websites. Which of the following would be BEST suited for this task?
Network Security | |
Compliance and Operational Security | |
Threats and Vulnerabilities | |
Application, Data and Host Security | |
Access Control and Identity Management | |
Cryptography |