During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
Herminia
6 days agoBarrett
14 days agoCyril
15 days agoSlyvia
15 days agoJosphine
3 days agoSelma
4 days agoCarlee
16 days agoOlive
17 days agoSoledad
18 days agoAlmeta
19 days agoGlory
23 days ago