header bg


An incident investigator requests a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on an organization's network that has experienced a probable security breach. When the investigator tries to correlate the information from all of the logs, the order of many of the logged events does not line up. What is the most probable answer?

A The network devices are not all synchronized.