During a recent network intrusion investigation, a CHFI received logs from Juniper IDS, Check Point IPS, and a Kippo Honeypot. Which log provides information about the network traffic and bandwidth adjustment, aiding in business risk valuation?
During a recent network intrusion investigation, a CHFI received logs from Juniper IDS, Check Point IPS, and a Kippo Honeypot. Which log provides information about the network traffic and bandwidth adjustment, aiding in business risk valuation?
Check Point IPS logs provide detailed information about the network traffic, allowing for the adjustment of bandwidth. This information aids in business risk valuation as it helps to understand how bandwidth is being used and potentially misused, which is critical for managing network resources and security.
Answer is D. CHFIv11 page 773: "Check Point...network traffic...adjustment of bandwidth...business risk valuation".
Intrusion Detection System (IDS) logs provide information helpful in finding suspicious packet types, determining probes, generating new attack signatures, and measuring attack statistics Some of the common IDS devices and tools include Juniper,...
Check Point logs provide information on the network traffic to enable adjustment of the bandwidth.
Checked the textbook, Jingu's answer is correct