Which two devices will create logs of suspicious content that has been detected in application traffic? (Choose two.)

IT Questions BankCategory: CyberOps AssociateWhich two devices will create logs of suspicious content that has been detected in application traffic? (Choose two.)

Which two devices will create logs of suspicious content that has been detected in application traffic? (Choose two.)

  • NetFlow
  • Email security appliance
  • Web security appliance
  • tcpdump
  • NBAR2

Explanation: Email and web security appliances will generate logs of suspicious content that has been removed from application traffic.

Exam with this question: 25.3.8 Check Your Understanding - Identify the Security Technology from the Data Description

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments