A security analyst reviews network logs. The data shows user network activities such as username, IP addresses, web pages accessed, and timestamp. Which type of data is the analyst reviewing?

IT Questions BankCategory: CCNA CyberOpsA security analyst reviews network logs. The data shows user network activities such as username, IP addresses, web pages accessed, and timestamp. Which type of data is the analyst reviewing?
A security analyst reviews network logs. The data shows user network activities such as username, IP addresses, web pages accessed, and timestamp. Which type of data is the analyst reviewing? 1ITExamAnswers Staff asked 4 months ago
A security analyst reviews network logs. The data shows user network activities such as username, IP addresses, web pages accessed, and timestamp. Which type of data is the analyst reviewing?

  • Alert
  • Session
  • Application
  • Transaction

Explanation: Transaction data focuses on the results of network sessions as reflected by the device logs kept by server processes, such as the details of a user’s visit to a website.

More Questions: CCNA Cyber Ops Chapter 11 Exam Answers


Related Articles