Refer to the exhibit.
An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior. Which type of compromise is occurring?
Delmy
6 months agoJame
5 months agoPauline
6 months agoParis
6 months agoShayne
6 months agoKattie
6 months agoLeatha
7 months agoShonda
7 months agoLeonor
7 months agoJenifer
7 months agoDominga
6 months agoCarolann
6 months agoAshlyn
7 months agoMiss
7 months ago