A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)
Nidia
1 months agoAn
2 days agoElliot
6 days agoMartina
1 months agoRichelle
1 months agoElza
2 months agoMatt
2 days agoHyman
3 days agoRosina
13 days agoCordie
14 days agoGenevive
20 days agoLeontine
2 months agoTawny
14 days agoDoyle
19 days agoKenneth
1 months agoDwight
2 months agoBarb
3 months agoRozella
3 months ago