Which of the following will MOST likely be used to identify when the breach occurred through each device?
A recent security breach exploited software vulnerabilities in the firewall and within the network management solution.
Which of the following will MOST likely be used to identify when the breach occurred through each device?
A . SIEM correlation dashboards
B. Firewall syslog event logs
C. Network management solution login audit logs
D. Bandwidth monitors and interface sensors
Answer: A
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments