Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
Fill in the blank: A(n) _____ tool can be used by security professionals to catch abnormal activity, like malware mining for cryptocurrency.
- Fileless malware
- Spyware
- Attack tree
- Intrusion detection system (IDS)