A security analyst discovered that a database administrator's workstation was compromised by malware. After examining the logs, the compromised workstation was observed connecting to multiple databases through ODBC. The following query behavior was captured:
Assuming this query was used to acquire and exfiltrate data, which of the following types of data was compromised, and what steps should the incident response plan contain?
ServerBrain
8 months, 4 weeks agoEAlonso
9 months, 4 weeks agoBadgerTester
1 year, 5 months agoBiteSize
1 year, 9 months agoFoxTrotDG
2 years, 2 months agop1s3c
1 year, 11 months agoToneBar
2 years, 2 months agoFOURDUE
2 years, 2 months agoFoxTrotDG
2 years, 2 months agoFOURDUE
2 years, 2 months ago