This question aligns with CHFI v11 objectives underNetwork and Web AttacksandNetwork Log Analysis. In digital forensics, network infrastructure logs are critical sources of evidence for detecting, analyzing, and reconstructing network-based attacks. CHFI v11 specifically emphasizes the forensic value of logs generated by network devices such asCisco switches, VPN gateways, and DNS servers.
Cisco switch logs provide information about device connections, port activity, MAC address mappings, VLAN assignments, and potential unauthorized access within the internal network. VPN logs reveal details about remote connections, including authentication attempts, user identities, IP addresses, session durations, and encrypted tunnel activity—crucial for identifying compromised credentials or unauthorized remote access. DNS server logs record domain name queries and responses, which help investigators detect command-and-control communication, data exfiltration attempts, malware beaconing, and access to malicious domains.
Together, these logs allow investigators to correlate events across the network, trace attacker movement, identify affected systems, and establish timelines of security incidents. The other options are incorrect because browser history is host-based evidence, and these logs are highly relevant to forensic investigations. Therefore, consistent with CHFI v11 network forensics principles, these logs provide insights into network traffic, device connections, and security incidents.
Submit