Last Updated on February 9, 2022 by Admin 3
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?
- LogIDS 1.0
- WIDS
- Snort 2.1.0
- NFR security
Last Updated on February 9, 2022 by Admin 3