Question 74:
A security analyst is conducting a post-incident log analysis to determine which indicators can be used to detect further occurrences of a data exfiltration incident. The analyst determines backups were not performed during this time and reviews the following:
Which of the following should the analyst review to find out how the data was exfiltrated?
Answer options:
A. Monday`s logs B. Tuesday`s logs C. Wednesday`s logs D. Thursday`s logs