Question: Louise would like to identify compromised systems on her network that may be participating in a botnet. She plans to do this by watching for
Louise would like to identify compromised systems on her network that may be participating in a botnet. She plans to do this by watching for connections made to known commandandcontrol servers. Which technique is most likely to provide this information if she has access to a list of known servers?
Group of answer choices
IDS logs
RFC logs
Authentication logs
Netflow records
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
