You are a professional Computer Hacking forensic investigator. You have been called to collect
the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you
review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A.
Web server logs
B.
Event logs
C.
System logs
D.
Program logs
Explanation: