The Head of IT Security has been asked to conduct a detailed forensic analysis of a suspected data breach that ted to customer credit card details being intercepted.
Which TWO of the following would be suitable objectives for such a forensic analysis?
Yuki
5 months agoYong
5 months agoMarti
6 months agoBuck
6 months agoNu
6 months agoCletus
6 months agoFloyd
6 months agoLindsey
6 months agoVeronika
6 months agoDarrel
6 months agoIvory
6 months agoSalome
7 months ago