The Head of IT Security has been asked to conduct a detailed forensic analysis of a suspected data breach that ted to customer credit card details being intercepted.
Which TWO of the following would be suitable objectives for such a forensic analysis?
Rory
4 months agoJaime
4 months agoPenney
4 months agoLenna
4 months agoClaudia
4 months agoDaniel
5 months agoDean
5 months agoArlene
5 months agoRosalind
5 months agoLonny
5 months agoAbraham
5 months agoTruman
5 months ago