Question: 51
A university’s online learning platform experiences intermit...
A security analyst is investigating a potential data breach. They have identified unusual outbound network connections from a workstation. Which of the following log types would be MOST effective in determining what specific data was exfiltrated during these connections?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! 🙏
No comments yet. Be the first to comment!