List of questions
Related questions
Question 64 - CAS-004 discussion
A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the time of the data loss. The analyst suspects the key to finding the source was obfuscated in an application. Which of the following tools should the analyst use NEXT?
A.
Software Decomplier
B.
Network enurrerator
C.
Log reduction and analysis tool
D.
Static code analysis
Your answer:
0 comments
Sorted by
Leave a comment first