Last Updated on May 10, 2022 by Admin
After a ransomware attack, a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?
- The public ledger
- The NetFlow data
- A checksum
- The event log