B< Restore points may contain the key piece of evidence to support a case, but are commonly overlooked. Content within restore points can be a crippling piece of history to leave behind for an attacker, exposing code, configurations and log files.
B is correct.
- B: Restore point are created if software or unsigned drivers are installed. It can help investigator to identify some change on the system made by attacker.
- C: System CheckPoints are created on schedule.
From EC-Council CHFI v10 book: Automatically created restore points have names assigned to them that are stored in the file rp.log located in the root of the folder RP##
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
5 months, 2 weeks agoElb
6 months, 3 weeks agoMalko59
1 year, 3 months agodiomaya
1 year, 5 months ago