List of questions
Related questions
Question 9 - 5V0-93.22 discussion
A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.
What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?
A.
Perform a custom search on the Endpoint Page.
B.
Access the Audit Log content to see associated events.
C.
Search for specific malware by hash or filename.
D.
Enable cloud analysis.
Your answer:
0 comments
Sorted by
Leave a comment first