ECCouncil Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 Question # 2 Topic 1 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 Question # 2 Topic 1 Discussion

312-49v10 Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?


A.

The firewall rejected a connection


B.

A virus was detected in an email


C.

The firewall dropped a connection


D.

An email was marked as potential spam


Get Premium 312-49v10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.