Sign Up
Log In
Home
discussion
Exam 200-201 Question id=6068 Security policies and procedures

Which piece of information is needed for attribution in an investigation?

A. proxy logs showing the source RFC 1918 IP addresses
B. RDP allowed from the Internet
C. known threat actor behavior
D. 802.1x RADIUS authentication pass arid fail logs