Question 2 of 10

What information should you look for when analyzing firewall logs to identify potential security threats?