You are investigating a potential attack that deploys a new ransomware strain.
You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.
You have three custom device groups.
You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Alpha
4 months agoLouvenia
5 months agoReita
5 months agoEdwin
5 months agoRanee
5 months agoMerlyn
5 months agoDoyle
5 months agoYolande
5 months agoCyndy
5 months agoAbel
5 months agoZita
5 months agoDana
5 months ago