List of questions
Related questions
Question 158 - 300-710 discussion
An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?
A.
client applications by user, web applications, and user connections
B.
number of attacked machines, sources of the attack, and traffic patterns
C.
intrusion events, host connections, and user sessions
D.
threat detections over time and application protocols transferring malware
Your answer:
0 comments
Sorted by
Leave a comment first