An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?
Limited Time Offer
25%
Off
Lavonna
11 days agoArlene
12 days agoHortencia
14 days agoDaniel
17 days agoAlayna
28 days agoSang
2 months agoCandida
2 months agoGerald
2 months ago