CySA+ CS0-001 – Q. 068

0
30

A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected. Which of the following sources would be used to evaluate which network service was interrupted?

A. Syslog
B. Network mapping
C. Firewall logs
D. NIDS

LEAVE A REPLY

Please enter your comment!
Please enter your name here