After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert. 1 point network protocol analyzer (packet sniffer) playbook SIEM tool dashboard internal infrastructure



Answer :

Other Questions