Which piece of information is needed for attribution in an investigation?
A) proxy logs showing the source RFC 1918 IP addresses
B) RDP allowed from the Internet
C) known threat actor behavior
D) 802.1x RADIUS authentication pass arid fail logs
Correct Answer:
Verified
Q81: An offline audit log contains the source
Q82: What is the difference between statistical detection
Q83: What is the difference between a threat
Q84: Which attack is the network vulnerable to
Q85: During which phase of the forensic process
Q87: Which evasion technique is indicated when an
Q88: Which list identifies the information that the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents