Isaca Cybersecurity Audit Practice Test 2

Question 1 / 35
Using digital evidence to provide validation that an attack has actually occurred is an example of;
Using digital evidence to provide validation that an attack has actually occurred is an example of;