A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

A. IPS logs
B. Application logs
C. IDS logs
D. History logs


Answer: A. IPS logs

Computer Science & Information Technology

You might also like to view...

Java is case sensitive. What does that mean?

What will be an ideal response?

Computer Science & Information Technology

The ________ returns one value if a condition is true and another value if a condition is false

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe what video scopes are used for

What will be an ideal response?

Computer Science & Information Technology

The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings

Indicate whether the statement is true or false.

Computer Science & Information Technology