Refer to the exhibit.
An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior. Which type of compromise is occurring?
Delmy
5 months agoJame
4 months agoPauline
4 months agoParis
4 months agoShayne
4 months agoKattie
5 months agoLeatha
5 months agoShonda
5 months agoLeonor
5 months agoJenifer
5 months agoDominga
4 months agoCarolann
5 months agoAshlyn
5 months agoMiss
5 months ago