What are security event logs commonly based on when sourced by traditional firewalls?

IT Questions BankCategory: CCNA CyberOpsWhat are security event logs commonly based on when sourced by traditional firewalls?

What are security event logs commonly based on when sourced by traditional firewalls?

  • static filtering
  • application analysis
  • signatures
  • 5-tuples

Explanation: Traditional firewalls commonly provide security event logs based on the 5-tuples of source IP address and port number, destination IP address and port number, and the protocol in use.

Exam with this question: CCNA SECOPS 210-255 Dumps – Certification Practice Exam Answers
Exam with this question: Modules 26 - 28: Analyzing Security Data Group Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x