👤

What can be deployed to intercept and log network traffic passing through the network?

NIDSs

protocol analyzers

event viewers

proxy catchers

NIPSs


Answer :

Answer:

Network intrusion detection systems (NIDSs)