When reviewing network traffic, a security analyst detects suspicious activity: admin 6 years ago When reviewing network traffic, a security analyst detects suspicious activity: Based on the log above, which of the following vulnerability attacks is occurring? A. ShellShock B. DROWN C. Zeus D. Heartbleed E. POODLE ← Previous question Next question →