A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?
A.
IPS logs
B.
Application logs
C.
IDS logs
D.
History logs
A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?
A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?
A.
IPS logs
B.
Application logs
C.
IDS logs
D.
History logs