8. Which of the following techniques is most likely to be employed by a credit card company looking for fraudulent transactions?
(A) Big data analysis
(B) Network forensics
(C) Script mining
(D) Drive imaging
答案:登入後查看
統計: A(0), B(1), C(0), D(0), E(0) #3565650
統計: A(0), B(1), C(0), D(0), E(0) #3565650