Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Lonny
3 months agoRegenia
3 months agoNorah
3 months agoHeike
4 months agoCelestina
4 months agoLisandra
4 months agoMelodie
4 months agoLou
4 months agoVerdell
5 months agoPamella
5 months agoChau
5 months agoDominque
5 months agoVerlene
5 months agoTabetha
5 months agoHerman
5 months agoFranchesca
5 months agoEthan
5 months agoViola
5 months agoJamal
10 months agoCarissa
9 months agoTamala
9 months agoValda
9 months agoFairy
10 months agoAmber
9 months agoMajor
9 months agoDaniel
10 months agoBrett
10 months agoXuan
10 months agoPhil
10 months agoKasandra
10 months agoDong
10 months agoErinn
11 months agoDesiree
9 months agoAdrianna
9 months agoElli
10 months agoWillie
10 months agoAudrie
11 months agoRolf
11 months ago