Posted by: Pdfprep
Post Date: November 14, 2020
A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected.
Which of the following sources would be used to evaluate which network service was interrupted?
A . Syslog
B . Network mapping
C . Firewall logs
D . NIDS
Answer: A
Leave a Reply