The exhibit shows an event log file with fields like date time action protocol src-ip dst-ip src-port dst-port etc., which are typical in Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS). These systems monitor network traffic for suspicious activity or violations of policies and produce reports as seen in the exhibit. References: Cisco Certified CyberOps Associate Overview
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit