CompTIA Security+ SY0-701 Practice Question
An organization is reviewing their network log policies to ensure they can effectively identify unauthorized access attempts. Which of the following logging details should the organization prioritize to BEST meet this objective?
Timestamps of data transfer
The total amount of data transferred during each session
Record the source IP address for all incoming traffic
Username associated with each session initiation