Posted by: Pdfprep
Post Date: November 11, 2020
What information from HTTP logs can be used to find a threat actor?
A . referer
B . IP address
C . user-agent
D . URL
Answer: B
Leave a Reply