A security analyst discovered that a database administrator's workstation was compromised by malware. After examining the logs, the compromised workstation was observed connecting to multiple databases through ODBC. The following query behavior was captured:
Assuming this query was used to acquire and exfiltrate data, which of the following types of data was compromised, and what steps should the incident response plan contain?
ServerBrain
11 months, 3 weeks agoEAlonso
1 year agoBadgerTester
1 year, 8 months agoBiteSize
2 years agoFoxTrotDG
2 years, 5 months agop1s3c
2 years, 2 months agoToneBar
2 years, 5 months agoFOURDUE
2 years, 5 months agoFoxTrotDG
2 years, 5 months agoFOURDUE
2 years, 5 months ago