In Step 2 of the network security wheel, what two types of methods are used to detect security violations?

In Step 2 of the network security wheel, what two types of methods are used to detect security violations?



Answer: (1) Active Method (2) Passive Methods


Learn More :