A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?
Erick
4 months agoLatia
4 months agoPeter
4 months agoJanae
4 months agoJulian
4 months agoTimothy
5 months agoMaddie
5 months agoSherita
5 months agoMalinda
5 months agoAlton
5 months agoRoselle
5 months agoCasie
5 months ago