You are investigating a potential attack that deploys a new ransomware strain.
You have three custom device groups. The groups contain devices that store highly sensitive information.
You plan to perform automated actions on all devices.
You need to be able to temporarily group the machines to perform actions on the devices.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Metasploit
Highly Voted 7 months, 1 week agoWutan
2 years, 3 months agoNikki0222
6 months, 1 week agoDaraVasu
2 years, 2 months agoMetasploit
2 years, 6 months agoKen88
Highly Voted 3 years, 1 month agolilou123
Most Recent 2 months, 1 week agolilou123
2 months, 1 week agochepeerick
1 year, 6 months agoKanguro007
2 years, 3 months agoHamatew
2 years, 3 months agoTx4free
3 years, 1 month agoTx4free
3 years, 1 month agoliberty123
3 years, 2 months agostromnessian
3 years, 3 months agoRandomNickname
3 years, 3 months agoMastersin
3 years, 4 months agoNail
3 years, 5 months agoNail
3 years, 4 months agokakakayayaya
3 years, 6 months agoMetasploit
2 years, 6 months ago