Which network logs contain information that a security analyst can use to determine if packets received from the web are in response to legitimate requests or are part of an exploit?

IT Questions BankCategory: Network DefenseWhich network logs contain information that a security analyst can use to determine if packets received from the web are in response to legitimate requests or are part of an exploit?

Which network logs contain information that a security analyst can use to determine if packets received from the web are in response to legitimate requests or are part of an exploit?

  • NetFlow logs
  • content filter logs
  • NBAR logs
  • proxy logs

Exam with this question: Network Defense (NetDef) Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x