Option D — suspicious registry or system file changes — is a classic Indicator of Attack, as it reflects potentially malicious behavior such as:
Malware modifying system files
Persistence mechanisms (e.g., registry Run keys)
Rootkit installation attempts
For B, it may be normal business to have log ins from different regions. For example, a multi-national company. It doesn't say the log ins were unauthorized.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
WereAllinThisTogether
1 week, 1 day agoPeterParkerrrr
3 months agoTwphill
1 month, 4 weeks ago