Notifications
Clear all
Topic starter
17/05/2022 2:02 am
After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker.
Which of the following will the company MOST likely review to trace this transaction?
- A . The public ledger
- B . The NetFlow data
- C . A checksum
- D . The event log
Suggested Answer: A