B< Restore points may contain the key piece of evidence to support a case, but are commonly overlooked. Content within restore points can be a crippling piece of history to leave behind for an attacker, exposing code, configurations and log files.
B is correct.
- B: Restore point are created if software or unsigned drivers are installed. It can help investigator to identify some change on the system made by attacker.
- C: System CheckPoints are created on schedule.
From EC-Council CHFI v10 book: Automatically created restore points have names assigned to them that are stored in the file rp.log located in the root of the folder RP##
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
6 months agoElb
7 months, 1 week agoMalko59
1 year, 3 months agodiomaya
1 year, 5 months ago