During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)
Hmm, let me see. Firewall logs and IDS/IPS logs, no doubt. Although, I hear the cafeteria's serving some killer tacos today. Just saying, it's a tough choice.
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
WIPS logs could also provide valuable data in determining the attacker's point of origin. It's important to consider all possible sources of information.
Wei
19 days agoAnglea
2 days agoGlendora
1 months agoAnnamaria
2 days agoCherri
5 days agoChauncey
19 days agoHerminia
2 months agoCassi
29 days agoBarrett
2 months agoCyril
2 months agoSlyvia
2 months agoDeeanna
26 days agoJustine
1 months agoOllie
1 months agoMitzie
1 months agoJosphine
1 months agoSelma
1 months agoCarlee
2 months agoOlive
2 months agoSoledad
2 months agoAlmeta
2 months agoGlory
2 months ago