Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Posted by: Pdfprep Category: CPEH-001 Tags: , ,

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A . har.txt
B . SAM file
C . wwwroot
D . Repair file

Answer: B

Leave a Reply

Your email address will not be published.