205k views
3 votes
What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmissions between a suspect’s computer and a network server. b. Poisoning data transmissions between a suspect’s computer and a network server. c. Preventing data transmissions between a suspect’s computer and a network server. d. Sniffing data transmissions between a suspect’s computer and a network server.

User WapShivam
by
5.2k points

1 Answer

5 votes

Answer:

c Preventing data transmissions between a suspect’s computer and a network server

Step-by-step explanation:

User Asif Hhh
by
5.5k points