A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?
A. IPS logs
B. Application logs
C. IDS logs
D. History logs
Answer: A. IPS logs
Computer Science & Information Technology
You might also like to view...
Java is case sensitive. What does that mean?
What will be an ideal response?
Computer Science & Information Technology
The ________ returns one value if a condition is true and another value if a condition is false
Fill in the blank(s) with correct word
Computer Science & Information Technology
Describe what video scopes are used for
What will be an ideal response?
Computer Science & Information Technology
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings
Indicate whether the statement is true or false.
Computer Science & Information Technology