List of questions
Related questions
Question 179 - 312-38 discussion
You are a professional Computer Hacking forensic investigator. You have been called to collect evidences of buffer overflow and cookie snooping attacks.
Which of the following logs will you review to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A.
Program logs
B.
Web server logs
C.
Event logs
D.
System logs
Your answer:
0 comments
Sorted by
Leave a comment first