List of questions
Related questions
Question 167 - 200-201 discussion
An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?
A.
by most active source IP
B.
by most used ports
C.
based on the protocols used
D.
based on the most used applications
Your answer:
0 comments
Sorted by
Leave a comment first