A malicious actor recently penetrated a company's network and moved laterally to the data center. Upon investigation, a forensics rm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics rm? A. Security B. Application C. Dump D. Syslog Correct Answer: C This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer