You are investigating a potential attack that deploys a new ransomware strain.
You have three custom device groups. The groups contain devices that store highly sensitive information.
You plan to perform automated actions on all devices.
You need to be able to temporarily group the machines to perform actions on the devices.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Metasploit
Highly Voted 3 months agoNikki0222
1 month, 4 weeks agoWutan
1 year, 11 months agoDaraVasu
1 year, 10 months agoMetasploit
2 years, 2 months agoKen88
Highly Voted 2 years, 9 months agochepeerick
Most Recent 1 year, 2 months agoKanguro007
1 year, 11 months agoHamatew
1 year, 11 months agoTx4free
2 years, 9 months agoTx4free
2 years, 9 months agoliberty123
2 years, 10 months agostromnessian
2 years, 10 months agoRandomNickname
2 years, 11 months agoMastersin
3 years agoNail
3 years agoNail
3 years agokakakayayaya
3 years, 2 months agoMetasploit
2 years, 2 months ago