List of questions
Related questions
Question 20 - ECSS discussion
Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.
Which of the following types of network-based evidence was collected by Bob in the above scenario?
A.
Statistical data
B.
Alert data
C.
Session data
D.
Full content data
Your answer:
0 comments
Sorted by
Leave a comment first