Computer Science, asked by rpsm1983, 9 months ago

The process of connecting to a computer network is called logging on to the network​

Answers

Answered by vashnith555
0

Answer:

Network connections (i.e., IP address and port) can lead investigators to the source of an intrusion, the command and control server for malware, or the destination of exfiltrated data. Ports could shed light on the type of traffic that was used in the attack.

Similar questions