Question: When reviewing the system logs, the cybersecurity analyst noticed a suspicious log entry wmic ode : HRDepartmentl computersystem get username Which of the following combinations

 When reviewing the system logs, the cybersecurity analyst noticed a suspicious

When reviewing the system logs, the cybersecurity analyst noticed a suspicious log entry wmic ode : HRDepartmentl computersystem get username Which of the following combinations describes what occurred, and what action should be taken in this situation? A A rogue user has queried for users logged in remotely Disable local access to network shares B Arogue user has queried for the administrator logged into the system Attemipt to determine who executed the command OC A rogue user has queried for the administrator logged into the system Disable local access to use end prompt D A rogue user has queried for users logged in remotely Attempt to determine who executed the command

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!