Refer to the exhibit. An engineer must use a 5-tuple approach to isolate a compromised host in a grouped set of logs.
Which data must the engineer use?
66
b4:2a0ef227 83
7c:5c:f8:9f:d1:fc
57813
Submit