Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A . har.txt
B . SAM file
C . wwwroot
D . Repair file
Answer: B
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A . har.txt
B . SAM file
C . wwwroot
D . Repair file
Answer: B