A network security engineer is responding to a security incident. The engineer suspects that an attacker used an authorized administrator account to make configuration changes to the boundary firewall. Which of the following should the network security engineer review?
tempovpn
Highly Voted 1 year agoa87d6a4
Most Recent 8 months ago