Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Jamal
30 days agoTamala
2 days agoValda
19 days agoFairy
1 months agoAmber
8 days agoMajor
19 days agoDaniel
28 days agoBrett
1 months agoXuan
2 months agoPhil
2 months agoKasandra
27 days agoDong
29 days agoErinn
2 months agoDesiree
16 days agoAdrianna
21 days agoElli
26 days agoWillie
1 months agoAudrie
2 months agoRolf
2 months ago