Which of the following could BEST be used to confirm the administrator’s suspicions?

An administrator is concerned that PCs on the internal network may be acting as zombies
participating in external DDoS attacks. Which of the following could BEST be used to confirm the
administrator’s suspicions?

An administrator is concerned that PCs on the internal network may be acting as zombies
participating in external DDoS attacks. Which of the following could BEST be used to confirm the
administrator’s suspicions?

A.
Proxy logs

B.
AV server logs

C.
HIDS logs

D.
Firewall logs



Leave a Reply 0

Your email address will not be published. Required fields are marked *