ECCouncil 312-49v11 Question Answer
During a forensic investigation into a suspected cyberattack, the investigator checks network logs that were collected during the period of the incident. The investigator's objective is to examine these logs to determine the exact sequence of events that took place, identify the source of the attack, and understand the nature of the incident. This analysis helps in uncovering what occurred, how it happened, and who was responsible for it.
Which of the following techniques is the investigator using in this case?

