Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A . har.txt
B . SAM file
C . wwwroot
D . Repair file

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments