During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
Barrett
5 days agoCyril
6 days agoSlyvia
6 days agoCarlee
7 days agoOlive
8 days agoSoledad
9 days agoAlmeta
10 days agoGlory
14 days ago