A security analyst has concluded that suspicious Intermittent network activity Is coming from one or more systems using random IP addresses and MAC addresses. The same IP or MAC address Is not used twice Which of the following Is the BEST course of action to Identify the source of the suspicious activity when It resumes?
Currently there are no comments in this discussion, be the first to comment!