Which of the following logs would be used to troubleshoot the traffic patterns trying to go across t
seenagape
A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?