A security analyst is conducting an investigation regarding a potential insider threat. An unauthorized USB device might have been used to exfiltrate proprietary data from a Linux system.
Which of the following options would identify the IoCs and provide the appropriate response?
tony_wang99
Highly Voted 7 months, 2 weeks agoSteel16
Most Recent 1 week, 2 days agoSteel16
1 week, 2 days ago891216f
1 month, 3 weeks agoBright07
2 months, 4 weeks agoa18733c
4 months agoBright07
5 months, 2 weeks agoSangSang
6 months, 4 weeks agoEAlonso
8 months ago