I think the key here is to focus on the types of data sources that can generate logs that would be useful for security or network monitoring. ICMP and SNMP seem like the most obvious choices based on that criteria.
I'm a little confused by the Juniper IOP and Microsoft SMBtail options. Those don't sound familiar to me as common log source types. I'll have to think this through carefully.
Okay, I've got this. ICMP and SNMP are both network protocols that generate log data, so those would be valid log source types. I'm pretty confident about those two options.
I'm a bit unsure about this one. I know ICMP and SNMP are network protocols, but I'm not sure if they would be considered log sources. I'll have to review my notes on log types.
Hmm, this looks like a tricky one. I'll need to think carefully about the different types of logs and network protocols that could be considered log sources.
The Probability and Impact Matrix is definitely the way to go here. It allows you to systematically evaluate each risk and prioritize them based on their likelihood and potential impact. Seems like the best approach to me.
Maryann
3 months agoBambi
3 months agoCristen
3 months agoTanja
4 months agoGolda
4 months agoPortia
4 months agoMarquetta
4 months agoJanna
4 months agoGayla
5 months agoTiara
5 months agoJacklyn
5 months agoChaya
5 months agoJolene
5 months agoMica
5 months agoMaricela
5 months agoBrandon
5 months agoMelda
2 years agoGianna
2 years agoTammi
2 years agoMinna
2 years ago