as a security analyst, you have discovered the victims of an malicious attack have several things in common. which tools would you use to help you identify who might be behind the attacks and prevent potential future victims?

Answer :

Other Questions