A security analyst is conducting an investigation regarding a potential insider threat. An unauthorized USB device might have been used to exfiltrate proprietary data from a Linux system.
Which of the following options would identify the IoCs and provide the appropriate response?
tony_wang99
Highly Voted 11 months agoBright07
Most Recent 3 weeks agoSteel16
3 months, 3 weeks agoSteel16
3 months, 3 weeks ago891216f
5 months agoBright07
6 months, 1 week agoa18733c
7 months, 1 week agoBright07
9 months agoSangSang
10 months, 1 week agoEAlonso
11 months, 1 week ago