Which type of device log contains the most beneficial security data?

a. Firewall log
b. Email log
c. Switch log
d. Router log

a. Firewall log

Computer Science & Information Technology

You might also like to view...

An SQL keyword defines the purpose and the structure of a SQL statement

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following equipment would allow for routing based on logical addresses?

A. Layer 2 hub B. Layer 2 switch C. Layer 1 NIC D. Layer 3 switch

Computer Science & Information Technology