Multiple Choice
Refer to the exhibit. An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior. Which type of compromise is occurring?
A) compromised insider
B) compromised root access
C) compromised database tables
D) compromised network
Correct Answer:
Verified
Related Questions
Q96: Q97: How does Wireshark decrypt TLS network traffic? Q98: A patient views information that is not Q99: Refer to the exhibit. Which command was
A)