What information from HTTP logs can be used to find a threat actor?

Posted by: Pdfprep Category: 210-255 Tags: , ,

What information from HTTP logs can be used to find a threat actor?
A . referer
B . IP address
C . user-agent
D . URL

Answer: B

Leave a Reply

Your email address will not be published.