اختبار شهادة امن المعلومات CompTIA Security+

السؤال 117 من 1095

كل الأسئلة

A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?

الخيارات

  • A Wireless access point
  • B Switch
  • C Firewall
  • D NAC

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.