A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected .
Which of the following sources would be used to evaluate which network service was interrupted?
A . Syslog
B . Network mapping
C . Firewall logs
D . NIDS
Answer: A
Latest CS0-001 Dumps Valid Version with 455 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund