You have been conducting threat reconnaissance of a corporate network undetected. You have left valuable evidence of your activities. From the following list, select one or more places where your activities might be detected.
options:
Firewall logs |
|
VOIP/VTC logs |
|
Router Logs |
|
DNS logs |
Solution:
->Firewall Logs
Explanation:
-> For any threat reconnaissance we have to use the Firewall logs, why because it can able to detect all the users from both the side from source to the destination.
-> Firewalls mostly deals with the traffic of any type of the network
->It detects all the traffic and filter the traffic of any network. if any network which is unauthorized access,it will detect automatically and block the outside user immediately.
->So, any network like military or any corporate networks they use Firewall to detect the unauthorized users.
->The correct option for the above question is firewall logs
Get Answers For Free
Most questions answered within 1 hours.