Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-85 All Questions
Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

ECCouncil CTIA 312-85 Question # 14 Topic 2 Discussion

312-85 Exam Topic 2 Question 14 Discussion:
Question #: 14
Topic #: 2

Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.

Which of the following key indicators of compromise does this scenario present?


A.

Unusual outbound network traffic


B.

Unexpected patching of systems


C.

Unusual activity through privileged user account


D.

Geographical anomalies


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.