Which of the following is a default directory in a Mac OS X that stores security-related logs?

Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any suspicious events.
This type of incident is categorized into?
Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.
What is he looking for?

Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.
What does this event log indicate?
