Refer to the exhibit. A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation is communicating with an external IP The analyst was not able to investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)
036e554
2 weeks, 1 day ago2c44ebe
1 month, 2 weeks agoStudyHard1111
5 months agoLuCKyDAM
5 months agod503c75
9 months agoAbang99
1 year, 1 month agoTricejer
1 year, 1 month ago