During incident response procedures, technicians capture a unique identifier for a piece of malware running in memory.
This captured information is referred to as:
A . a hash value.
B . the SSI
D . the GUI
F . a system image.
Answer: A
During incident response procedures, technicians capture a unique identifier for a piece of malware running in memory.
This captured information is referred to as:
A . a hash value.
B . the SSI
D . the GUI
F . a system image.
Answer: A