SlideShare a Scribd company logo
Discuss the types of items that should be examined in a firewall
log:
a. IP addresses that are being rejected and dropped
b. Probes to ports that have no application services running on
them
c. Source-routed packets
d. Suspicious outbound connections
e. Unsuccessful logins

More Related Content

DOCX
Discuss three (3) ways that large organizations are increasingly eng.docx
DOCX
Discuss this week’s objectives with your team sharing related rese.docx
DOCX
Discuss theoretical considerations or assumptions relevant to yo.docx
DOCX
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
DOCX
Discuss the Windows Registry System Hive1) What information.docx
DOCX
Discuss the way the idea of heroism develops from Gilgamesh th.docx
DOCX
Discuss the ways in which the history of the U.S. was presented in t.docx
DOCX
Discuss the value of Lean Systems Engineering to systems develop.docx
Discuss three (3) ways that large organizations are increasingly eng.docx
Discuss this week’s objectives with your team sharing related rese.docx
Discuss theoretical considerations or assumptions relevant to yo.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss the Windows Registry System Hive1) What information.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the ways in which the history of the U.S. was presented in t.docx
Discuss the value of Lean Systems Engineering to systems develop.docx

More from rhetttrevannion (20)

DOCX
discuss the various pathways interest groups use to influence politi.docx
DOCX
Discuss the various tools and techniques used by an HCO to incre.docx
DOCX
Discuss the various means by which slaves resisted the slave system..docx
DOCX
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
DOCX
Discuss the types of resources, tools, and methods that are availabl.docx
DOCX
Discuss the types of property, providing an example of each an.docx
DOCX
Discuss the type of personality it takes to become a police officer..docx
DOCX
Discuss the two major sources of crime statistics for the United Sta.docx
DOCX
Discuss the two most prominent theories related to the stage of adul.docx
DOCX
Discuss the two elements required for the consent defense. In ad.docx
DOCX
Discuss the Truth in Lending Act and what role it places in financia.docx
DOCX
Discuss the traits, behaviors, and leadership style you would expect.docx
DOCX
Discuss the three main forces that have been responsible for hospita.docx
DOCX
Discuss the threats and vulnerabilities to Access Control and what b.docx
DOCX
Discuss the theories of the origin of Black English discussed by McW.docx
DOCX
Discuss the the threats and vulnerabilities to Access Control and wh.docx
DOCX
Discuss the strengths and weaknesses of using K-Means clustering .docx
DOCX
Discuss the sociological theories of aging disengagement.docx
DOCX
Discuss the source of the legitimacy problem associated with earthl.docx
DOCX
Discuss the State v. Stu Dents case and ruling with your g.docx
discuss the various pathways interest groups use to influence politi.docx
Discuss the various tools and techniques used by an HCO to incre.docx
Discuss the various means by which slaves resisted the slave system..docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of property, providing an example of each an.docx
Discuss the type of personality it takes to become a police officer..docx
Discuss the two major sources of crime statistics for the United Sta.docx
Discuss the two most prominent theories related to the stage of adul.docx
Discuss the two elements required for the consent defense. In ad.docx
Discuss the Truth in Lending Act and what role it places in financia.docx
Discuss the traits, behaviors, and leadership style you would expect.docx
Discuss the three main forces that have been responsible for hospita.docx
Discuss the threats and vulnerabilities to Access Control and what b.docx
Discuss the theories of the origin of Black English discussed by McW.docx
Discuss the the threats and vulnerabilities to Access Control and wh.docx
Discuss the strengths and weaknesses of using K-Means clustering .docx
Discuss the sociological theories of aging disengagement.docx
Discuss the source of the legitimacy problem associated with earthl.docx
Discuss the State v. Stu Dents case and ruling with your g.docx

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Types and Its function , kingdom of life
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
RMMM.pdf make it easy to upload and study
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Microbial disease of the cardiovascular and lymphatic systems
Cell Types and Its function , kingdom of life
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
Anesthesia in Laparoscopic Surgery in India
Module 4: Burden of Disease Tutorial Slides S2 2025
01-Introduction-to-Information-Management.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Discuss the types of items that should be examined in a firewall log.docx

  • 1. Discuss the types of items that should be examined in a firewall log: a. IP addresses that are being rejected and dropped b. Probes to ports that have no application services running on them c. Source-routed packets d. Suspicious outbound connections e. Unsuccessful logins