A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?
a. to obtain specially designed operating systems preloaded with tools optimized for hacking.
b. to detect any evidence of a hack or malware in a computer or network.
c. to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network.
d. to reverse engineer binary files when writing exploits and when analyzing malware.