Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Jamal
3 months agoCarissa
1 months agoTamala
2 months agoValda
2 months agoFairy
3 months agoAmber
2 months agoMajor
2 months agoDaniel
2 months agoBrett
3 months agoXuan
3 months agoPhil
3 months agoKasandra
2 months agoDong
3 months agoErinn
3 months agoDesiree
2 months agoAdrianna
2 months agoElli
2 months agoWillie
3 months agoAudrie
3 months agoRolf
4 months ago