• Post author:
  • Post category:Updated
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

What are security event logs commonly based on when sourced by traditional firewalls?

  • 5-tuples
  • static filtering
  • signatures
  • application analysis
Answers Explanation & Hints:

Traditional firewalls commonly provide security event logs based on the 5-tuples of source IP address and port number, destination IP address and port number, and the protocol in use.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 26 – 28: Analyzing Security Data Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments