After a ransomware attack. a forensics company needs to review a cryptocurrency transaction between the victim and the attacker.
Which of the following will the company MOST likely review to trace this transaction?
A . The public ledger
B . The NetFlow data
C . A checksum
D . The event log
Answer: D