Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?

A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?

A.
IPS logs

B.
Application logs

C.
IDS logs

D.
History logs



Leave a Reply 0

Your email address will not be published. Required fields are marked *