List of questions
Related questions
Question 67 - 212-82 discussion
As a cybersecurity technician, you were assigned to analyze the file system of a Linux image captured from a device that has been attacked recently. Study the forensic image 'Evidenced.img" in the Documents folder of the "Attacker Machine-1" and identify a user from the image file. (Practical
Question)
A.
smith
B.
attacker
C.
roger
D.
john
Your answer:
0 comments
Sorted by
Leave a comment first