The process of connecting to a computer network is called logging on to the network
Answers
Answered by
0
Answer:
Network connections (i.e., IP address and port) can lead investigators to the source of an intrusion, the command and control server for malware, or the destination of exfiltrated data. Ports could shed light on the type of traffic that was used in the attack.
Similar questions