What are security event logs commonly based on when sourced by traditional firewalls?
- 5-tuples
- static filtering
- signatures
- application analysis
Answers Explanation & Hints:
Traditional firewalls commonly provide security event logs based on the 5-tuples of source IP address and port number, destination IP address and port number, and the protocol in use. |