List of questions
Related questions
Question 744 - N10-008 discussion
A network security engineer is responding to a security incident. The engineer suspects that an attacker used an authorized administrator account to make configuration changes to the boundary firewall. Which of the following should the network security engineer review?
A.
Network traffic logs
B.
Audit logs
C.
Syslogs
D.
Event logs
Your answer:
0 comments
Sorted by
Leave a comment first