Q: 15
A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an
external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s
behavior. Which logs should be reviewed next to evaluate this file further?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.