Free CompTIA Security+ SY0-701 Practice Question

Which data source would an investigator most likely review to trace unauthorized internal traffic patterns indicative of post-breach attacker movement?

  • Endpoint logs

  • Application logs

  • Network logs

  • System health reports

This question's topic:
CompTIA Security+ SY0-701 / 
Security Operations
Your Score:

Check or uncheck an objective to set which questions you will receive.