The Head of IT Security has been asked to conduct a detailed forensic analysis of a suspected data breach that ted to customer credit card details being intercepted.
Which TWO of the following would be suitable objectives for such a forensic analysis?
Yuki
4 months agoYong
4 months agoMarti
4 months agoBuck
4 months agoNu
4 months agoCletus
5 months agoFloyd
5 months agoLindsey
5 months agoVeronika
5 months agoDarrel
5 months agoIvory
5 months agoSalome
5 months ago