Question: Martha keeps digging into network events surrounding the security events. What is Martha looking for in the following command? cat conn.log | zeek - cut

Martha keeps digging into network events surrounding the security events. What is Martha looking for in the following command?
cat conn.log | zeek-cut id.orig_h | sort | uniq -c | sort -n | tail -n 5
Select one:
The top 5 IP addresses with the most activity
The destination of each unique host
The host originating the most activity
The host receiving the most activity

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!