Tooey665 Tooey665 19-04-2024 Computers and Technology Answered After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert. 1 point network protocol analyzer (packet sniffer) playbook SIEM tool dashboard internal infrastructure