You work as a Network Administrator for DataSoft Inc. The company needs a secure network. You
have been assigned the task to track the network attacks that have occurred within the last one
month. To accomplish the task, you need to scan the log files for suspicious events and patterns.
Which of the following will you use to scan the log files?
A.
PsTools suite
B.
System Integrity Verifiers (SIV)
C.
Log File Monitor (LFM)
D.
Specter
Explanation: