List of questions
Related questions
Question 35 - 5V0-93.22 discussion
A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.
Which components can be checked to further inspect the cause of the alert?
A.
Command lines. Device ID, and priority score
B.
Event details, command lines, and TTPs involved
C.
TTPs involved, network connections, and child path
D.
Priority score, file reputation, and timestamp
Your answer:
0 comments
Sorted by
Leave a comment first