Question 46
What is the process of monitoring and capturing all data packets passing through a given network using different tools?
Question 47
Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
Question 48
Which of the log storage method arranges event logs in the form of a circular buffer?
Question 49
Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
Question 50
Which encoding replaces unusual ASCII characters with "%" followed by the character's two-digit ASCII code expressed in hexadecimal?

