A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?
ColWilson
3 months, 1 week agoBionicBeaver
1 year, 3 months agoAnzk
1 year, 3 months agopdbone
1 year, 4 months agopdbone
1 year, 4 months agoAlapo
1 year, 4 months agodarius23631493167
1 year, 8 months agoLordXander
1 year, 7 months agoAlapo
1 year, 4 months ago