Question 87:
A malicious actor recently penetrated a company`s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics firm?
Answer options:
A. Security B. Application C. Dump D. Syslog