Notifications
Clear all
Topic starter
19/06/2022 3:27 am
A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the time of the data loss. The analyst suspects the key to finding the source was obfuscated in an application .
Which of the following tools should the analyst use NEXT?
- A . Software Decomplier
- B . Network enurrerator
- C . Log reduction and analysis tool
- D . Static code analysis
Suggested Answer: D