You are investigating a potential attack that deploys a new ransomware strain.
You have three custom device groups. The groups contain devices that store highly sensitive information.
You plan to perform automated actions on all devices.
You need to be able to temporarily group the machines to perform actions on the devices.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Metasploit
Highly Voted 2 weeks, 6 days agoWutan
1 year, 8 months agoDaraVasu
1 year, 8 months agoMetasploit
1 year, 11 months agoHamatew
1 year, 9 months agoKen88
Highly Voted 2 years, 7 months agochepeerick
Most Recent 11 months, 3 weeks agoKanguro007
1 year, 9 months agoHamatew
1 year, 9 months agoTx4free
2 years, 7 months agoTx4free
2 years, 7 months agoliberty123
2 years, 7 months agostromnessian
2 years, 8 months agoRandomNickname
2 years, 9 months agoMastersin
2 years, 10 months agoNail
2 years, 10 months agoNail
2 years, 9 months agokakakayayaya
2 years, 11 months agoMetasploit
1 year, 11 months ago