Which of the following will MOST likely be used to identify when the breach occurred through each device?

A recent security breach exploited software vulnerabilities in the firewall and within the network management solution.

Which of the following will MOST likely be used to identify when the breach occurred through each device?
A . SIEM correlation dashboards
B. Firewall syslog event logs
C. Network management solution login audit logs
D. Bandwidth monitors and interface sensors

Answer: A

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments