List of questions
Related questions
Question 262 - SY0-701 discussion
An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?
A.
Network
B.
System
C.
Application
D.
Authentication
Your answer:
0 comments
Sorted by
Leave a comment first