Which of the following processes is Rudy using in the case: Rudy is examining malware detected during a pentest. He's taken a snapshot of the test machine and is about to launch the malware. He will then take a snapshot and monitor various components such as ports, processes, event logs, and others for any changes.
Comments