Question: Louise would like to identify compromised systems on her network that may be participating in a botnet. She plans to do this by watching for

Louise would like to identify compromised systems on her network that may be participating in a botnet. She plans to do this by watching for connections made to known command-and-control servers. Which technique is most likely to provide this information - if she has access to a list of known servers?
Group of answer choices
IDS logs
RFC logs
Authentication logs
Netflow records

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!