List of questions
Related questions
Question 527 - 220-1102 discussion
A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?
A.
Investigate the firewall logs.
B.
Isolate the machine from the network.
C.
Inspect the Windows Event Viewer.
D.
Take a physical inventory of the device.
Your answer:
0 comments
Sorted by
Leave a comment first