Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A . har.txt
B. SAM file
C. wwwroot
D. Repair file

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments