An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?
Security event was monitored but not stopped
Malicious URL detected
An email marked as potential spam
Connection rejected
Submit