maxwellbryant maxwellbryant 18-09-2021 Computers and Technology contestada Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?