The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 184.108.40.206:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 220.127.116.11:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 18.104.22.168:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?
A. A NIDS was used in place of a NIPS.
B. The log is not in UTC.
C. The external party uses a firewall.
D. ABC company uses PAT.