155k views
5 votes
Some of your technically proficient users have modified their company-issued Android smartphone to provide full device access in order to install apps requiring this permission. Which term best describes this scenario

1 Answer

5 votes

Answer:

NIPS HIDS HIPS

Step-by-step explanation:

A is not specific to a host but instead analyzes network traffic from many sources to detect potentially malicious activity

User Emad
by
8.8k points