CompTIA Security+ SY0-701 Practice Question
Which data source would an investigator most likely review to trace unauthorized internal traffic patterns indicative of post-breach attacker movement?
Application logs
System health reports
Network logs
Endpoint logs