Which type of device log contains the most beneficial security data?
a. Firewall log
b. Email log
c. Switch log
d. Router log
a. Firewall log
Computer Science & Information Technology
You might also like to view...
An SQL keyword defines the purpose and the structure of a SQL statement
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following equipment would allow for routing based on logical addresses?
A. Layer 2 hub B. Layer 2 switch C. Layer 1 NIC D. Layer 3 switch
Computer Science & Information Technology