A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data
Exam N10-008: CompTIA Network+Free dumps for N10-008 in PDF format.High quality N10-008 PDF and software. VALID exam to help you pass. |