Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
Jamal
17 days agoValda
7 days agoFairy
21 days agoMajor
6 days agoDaniel
16 days agoBrett
23 days agoXuan
1 months agoPhil
1 months agoKasandra
14 days agoDong
17 days agoErinn
1 months agoDesiree
4 days agoAdrianna
9 days agoElli
13 days agoWillie
24 days agoAudrie
1 months agoRolf
2 months ago