Which piece of information is needed for attribution in an investigation?

Which piece of information is needed for attribution in an investigation?
A . proxy logs showing the source RFC 1918 IP addresses
B . RDP allowed from the Internet
C . known threat actor behavior
D . 802.1x RADIUS authentication pass arid fail logs

Answer: C

Explanation:

Actually this is the most important thing: know who, what, how, why, etc..

attack the network.

Latest 200-201 Dumps Valid Version with 154 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments