This is a dedicated watch page for a single video.
You are doing an analysis of the organization's security measures to determine their ability to identify attempted intrusions. You have been told by the administrator of the system that there have been multiple unsuccessful attempts to break in from outside the organization. Which of the following is the BEST method for identifying such an unauthorized entry?