PdfPrep.com

Which of the following files should be given to the forensics firm?

A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server.

Which of the following files should be given to the forensics firm?
A . Security
B . Application
C . Dump
D . Syslog

Answer: C

Exit mobile version