Exhibit:
Based on the following extract from the log of a compromised machine, what is the hacker really
trying to steal?
A.
har.txt
B.
SAM file
C.
wwwroot
D.
Repair file
Explanation:
He is actually trying to get the file har.txt but this file contains a copy of the SAM file.