Which of the following logs will you review to accomplish the task?

You are a professional Computer Hacking forensic investigator. You have been called to collect
the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you
review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

You are a professional Computer Hacking forensic investigator. You have been called to collect
the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you
review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A.
Web server logs

B.
Event logs

C.
Program logs

D.
System logs

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *