Emily, a network security analyst, is reviewing the logs generated by a Cisco firewall after a suspected attack on the company's network. She encounters a log message related to a connection attempt that seems suspicious. The log shows an entry with mnemonic 106022. Based on the firewall's logging patterns, which of the following best describes the log message Emily found?
Submit