A network administrator working in an ABC organization collected log files generated by a traffic
monitoring system, which may not seem to have useful information, but after performing proper
analysis by him, the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?
C
Module 6 p696