CompTIA Security+ SY0-601 – Question055

A recent security breach exploited software vulnerabilities in the firewall and within the network management
solution. Which of the following will MOST likely be used to identify when the breach occurred through each
device?


A.
SIEM correlation dashboards
B. Firewall syslog event logs
C. Network management solution login audit logs
D. Bandwidth monitors and interface sensors

Correct Answer: B