List of questions
Related questions
Question 785 - CISSP discussion
Which of the following techniques is MOST useful when dealing with Advanced persistent Threat (APT) intrusions on live virtualized environments?
A.
Antivirus operations
B.
Reverse engineering
C.
Memory forensics
D.
Logfile analysis
Your answer:
0 comments
Sorted by
Leave a comment first