A computer forensics investigator is inspecting the firewall logs for a large financial institution that has
employees working 24 hours a day, 7 days a week.
What can the investigator infer from the screenshot seen below?
A.
A smurf attack has been attempted
B.
A denial of service has been attempted
C.
Network intrusion has occurred
D.
Buffer overflow attempt on the firewall.