A security analyst is conducting an investigation regarding a potential insider threat. An unauthorized USB device might have been used to exfiltrate proprietary data from a Linux system.
Which of the following options would identify the IoCs and provide the appropriate response?
tony_wang99
Highly Voted 9 months, 1 week agoSteel16
Most Recent 2 months agoSteel16
2 months ago891216f
3 months, 1 week agoBright07
4 months, 2 weeks agoa18733c
5 months, 3 weeks agoBright07
7 months, 1 week agoSangSang
8 months, 2 weeks agoEAlonso
9 months, 3 weeks ago