List of questions
Related questions
Question 85 - 212-82 discussion
Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved in online criminal activities. Gideon navigated to a directory containing a log file that recorded information related to user login/logout. This information helped Gideon to determine the current login state of cyber criminals in the victim system, identify the Linux log file accessed by Gideon in this scenario.
A.
/va r/l og /mysq Id. log
B.
/va r/l og /wt m p
C.
/ar/log/boot.iog
D.
/var/log/httpd/
Your answer:
0 comments
Sorted by
Leave a comment first