What type of threat actor activity might this represent?

An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic. What type of threat actor activity might this represent?A . Data exfiltrationB...

February 2, 2025 No Comments READ MORE +

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?A . Host-based firewallB . Web proxyC . Endpoint Detection and ResponseD . Intrusion Detection SystemView AnswerAnswer: D

January 30, 2025 No Comments READ MORE +