A security analyst reviews network logs. The data shows user network activities such as username, IP addresses, web pages accessed, and timestamp. Which type of data is the analyst reviewing?
Explanation: Transaction data focuses on the results of network sessions as reflected by the device logs kept by server processes, such as the details of a user’s visit to a website.
More Questions: CCNA Cyber Ops Chapter 11 Exam Answers