Hmm, I'm not sure about C and D. Accessing files from a removable drive and suspicious host behavior could be normal activities, depending on the context. I'll have to think about those a bit more.
I'm pretty confident that A and B are the right answers here. Identified vulnerability exploits and malware execution are definitely security risks that would be flagged by correlation objects.
Okay, let's think this through. The question is asking about network events that are highlighted as potential security risks, so I'm guessing the correct answers will be the ones that indicate some kind of suspicious activity.
Macy
2 months agoElbert
2 months agoCorinne
3 months agoTawna
3 months agoJean
3 months agoLuisa
3 months agoTamesha
4 months agoBrock
4 months agoMarguerita
4 months agoAlesia
4 months agoKati
4 months agoKerrie
5 months agoFelicitas
5 months agoEvangelina
9 months agoSon
8 months agoCarlota
9 months agoRaul
9 months agoDalene
10 months agoLanie
8 months agoVerda
8 months agoJose
8 months agoElena
8 months agoFatima
9 months agoMaynard
9 months agoTuyet
10 months agoMel
9 months agoYoulanda
9 months agoBrent
9 months agoWalker
10 months agoTish
10 months agoRosalia
10 months agoCasey
9 months agoChaya
10 months agoChantay
10 months agoMoon
10 months agoWerner
10 months agoWerner
11 months ago