List of questions
Related questions
Question 328 - SY0-701 discussion
An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).
A.
Application
B.
Authentication
C.
DHCP
D.
Network
E.
Firewall
F.
Database
Your answer:
0 comments
Sorted by
Leave a comment first