Practice Test Geeks home

ACI ACI Network Forensics & Incident Response

During a network forensics investigation, which type of log is most useful for reconstructing the timeline of a security breach?

Select your answer