06 Mar Discuss two forms of unauthorized access to a network. What is their purpose and how can a network administrator detect their occurrence using an auditing tool?
2.Discuss two forms of unauthorized access to a network. What is their purpose and how can a network administrator detect their occurrence using an auditing tool?