MultipleChoice
An analyst discovers malicious software present within the network. When tracing the origin of the software, the analyst discovers it is actually a part of a third-party vendor application that is used regularly by the organization. This is an example of what kind of threat?
OptionsMultipleChoice
What Splunk feature would enable enriching public IP addresses with ASN and owner information?
Options