A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
In the case of identifying a cryptominer attack through container audits, the options that could have generated this audit include B. High CPU usage over time for the container is detected, which is a common indicator of cryptomining activity as it consumes significant computational resources, C. Common cryptominer process name was found, which directly indicates the presence of cryptomining based on known malicious processes, and E. Common cryptominer port usage was found, suggesting cryptomining activity based on network behavior typical of such attacks.
Ellen
10 days agoThomasena
10 days agoCory
13 days agoVincenza
3 days agoBrock
19 days agoIzetta
28 days agoSabra
1 days agoJunita
1 months agoEttie
2 months agoShaun
18 days agoWhitley
22 days agoNoemi
1 months ago