Q: 12
In a secure government communication network, an automated alert indicates the presence of
anomalous DLL files injected into the system memory during a routine update of communication
protocols. These DLL files are exhibiting beaconing behavior to a satellite IP known for signal
interception risks. Concurrently, there is an uptick in encrypted traffic volumes that suggests possible
data exfiltration. Which set of actions should the security engineer prioritize?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.