An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?
A) best evidence
B) corroborative evidence
C) indirect evidence
D) forensic evidence
Correct Answer:
Verified
Q76: What is rule-based detection when compared to
Q77: An investigator is examining a copy of
Q78: How is attacking a vulnerability categorized?
A) action
Q79: Which type of evidence supports a theory
Q80: What is the difference between the ACK
Q82: What is the difference between statistical detection
Q83: What is the difference between a threat
Q84: Which attack is the network vulnerable to
Q85: During which phase of the forensic process
Q86: Which piece of information is needed for
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents