Joe, the security administrator, has determined that one of his web servers is under attack. Which
of the following can help determine where the attack originated from?

A.
Capture system image
B.
Record time offset
C.
Screenshots
D.
Network sniffing