Which network logs contain information that a security analyst can use to determine if packets received from the web are in response to legitimate requests or are part of an exploit?
- NetFlow logs
- content filter logs
- NBAR logs
- proxy logs
Exam with this question: Network Defense (NetDef) Course Final Exam Answers
Please login or Register to submit your answer