Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Lonny
4 months agoRegenia
5 months agoNorah
5 months agoHeike
5 months agoCelestina
5 months agoLisandra
6 months agoMelodie
6 months agoLou
6 months agoVerdell
6 months agoPamella
6 months agoChau
6 months agoDominque
6 months agoVerlene
6 months agoTabetha
6 months agoHerman
6 months agoFranchesca
6 months agoEthan
6 months agoViola
6 months agoJamal
11 months agoCarissa
10 months agoTamala
10 months agoValda
11 months agoFairy
11 months agoAmber
11 months agoMajor
11 months agoDaniel
11 months agoBrett
11 months agoXuan
12 months agoPhil
12 months agoKasandra
11 months agoDong
11 months agoErinn
1 year agoDesiree
11 months agoAdrianna
11 months agoElli
11 months agoWillie
11 months agoAudrie
1 year agoRolf
1 year ago