Question: When reviewing the system logs, the cybersecurity analyst noticed a suspicious log entry wmic ode : HRDepartmentl computersystem get username Which of the following combinations
When reviewing the system logs, the cybersecurity analyst noticed a suspicious log entry wmic ode : HRDepartmentl computersystem get username Which of the following combinations describes what occurred, and what action should be taken in this situation? A A rogue user has queried for users logged in remotely Disable local access to network shares B Arogue user has queried for the administrator logged into the system Attemipt to determine who executed the command OC A rogue user has queried for the administrator logged into the system Disable local access to use end prompt D A rogue user has queried for users logged in remotely Attempt to determine who executed the command
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
