An analyst is investigating an anomalous event reported by the SOC. After reviewing the system logs, the analyst identifies an unexpected addition of a user with root-level privileges on the endpoint. Which of the following data sources will BEST help the analyst to determine whether this event constitutes an incident?
Suggested Answer:
E
somsom
1 month, 2 weeks agoamericaman80
1 month, 3 weeks agoI_heart_shuffle_girls
2 months, 4 weeks agoObi_Wan_Jacoby
2 months, 2 weeks agoObi_Wan_Jacoby
2 months, 2 weeks agobtoopalow
2 months, 4 weeks ago