CIS 349 Course Great Wisdom / tutorialrank.com CIS 349 Course Great Wisdom / tutorialrank.com | Page 6

9) There are two common types of monitoring tools available for monitoring LANs, __________ and network software log files. 10) Which control is used in the LAN Domain to protect the confidentiality of data? 11) Which of the following is not typically a LAN Domain component? 12) Which of the following is not a step to ensuring only authorized users can see confidential data in the LAN Domain?