Site icon Exam4Training

Which technique involves analyzing metadata and artifacts left behind by attackers to determine their identity?

Which technique involves analyzing metadata and artifacts left behind by attackers to determine their identity?
A . Behavioral analysis
B . Network forensics
C . Malware analysis
D . Digital footprint analysis

Answer: B

Latest 300-220 Dumps Valid Version with 130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version