header bg

Scan QR code or get instant email to install app


Which of the following processes is Rudy using in the case:
Rudy is examining malware detected during a pentest. He's taken a snapshot of the test machine and is about to launch the malware. He will then take a snapshot and monitor various components such as ports, processes, event logs, and others for any changes.

A Host integrity monitoring

Related Information