Q1) Find the most effective method to find out if attack has been made on computer network? What malicious activities does your recommendation identify? What activities does your recommendation not protect against? Provide examples and/or details. Brief response, please include source of information.