header bg

Scan QR code or get instant email to install app

Question:

Which of the following processes is Rudy using in the case:
Rudy is examining malware detected during a pentest. He's taken a snapshot of the test machine and is about to launch the malware. He will then take a snapshot and monitor various components such as ports, processes, event logs, and others for any changes.

A Host integrity monitoring
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*