subject

A threat actor has brute forced a Domain Administrator account via RDP. They did this by running a Meterpreter reverse shell and a RPD proxy via Tor on a Domain Controller. Management wants details as soon as possible. IT needs indicators of compromise (IOCs). Security wants to know the next moves of the bad actors and who they are likely to be. You realize you need to construct a timeline of events to structure your investigation to provide these answers. Based on what you have learned in this class, and research that you gain from credible sources in the Library or online, write a report to management on the following: Explain the significance of timeline creation and analysis in incident response and forensic analysis. Answer the following: How does timeline analysis contribute to the analysis of the tactics, techniques, and procedures (TTPs) used in an attack

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 05:20, jaylenmiller437
Which operating system is a version of linux?
Answers: 1
image
Computers and Technology, 23.06.2019 11:30, kyraj21
Which excel file extension stores automated steps for repetitive tasks?
Answers: 1
image
Computers and Technology, 24.06.2019 14:30, thelordoftheknowwjo4
In a home that has 120 v service, there is an electric appliance that has a resistance of 12 ohms. how much power will this appliance consume? a. 10 w b. 120 w c 1200 w d. 1440 w
Answers: 1
image
Computers and Technology, 24.06.2019 15:00, marelinatalia2000
When a presentation is being planned, it is important to ensure that it covers all available information. appeals to the audience. uses multimedia tools. entertains the audience.
Answers: 1
You know the right answer?
A threat actor has brute forced a Domain Administrator account via RDP. They did this by running a M...

Questions in other subjects:

Konu
Mathematics, 24.04.2020 17:31