subject

A threat actor has brute forced a Domain Administrator account via RDP. They did this by running a Meterpreter reverse shell and a RPD proxy via Tor on a Domain Controller. Management wants details as soon as possible. IT needs indicators of compromise (IOCs). Security wants to know the next moves of the bad actors and who they are likely to be. You realize you need to construct a timeline of events to structure your investigation to provide these answers. Based on what you have learned in this class, and research that you gain from credible sources in the Library or online, write a report to management on the following: Explain the significance of timeline creation and analysis in incident response and forensic analysis. Answer the following: How does timeline analysis contribute to the analysis of the tactics, techniques, and procedures (TTPs) used in an attack

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 00:30
Knowing that the central portion of link bd has a uniform cross sectional area of 800 mm2 , determine the magnitude of the load p for which the normal stress in link bd is 50 mpa. (hint: link bd is a two-force member.) ans: p = 62.7 kn
Answers: 2
question
Computers and Technology, 23.06.2019 17:00
What does the faves button do? a. users mark a web page as a favorite b. leads other readers to favor a specific page c. readers sort and align their favicons, or favorite icons d. leads users to a message board where they can post questions
Answers: 1
question
Computers and Technology, 24.06.2019 00:00
Afashion designer wants to increase awareness about her brand. which network can she use and why she can use the blank to blank her products online. answers for the first blank: internet, extranet, or intranet answers for the second blank: market, design, and export
Answers: 1
question
Computers and Technology, 24.06.2019 03:00
What is one potential problem associated with an organization purchasing new technology early in its lifecycle
Answers: 1
You know the right answer?
A threat actor has brute forced a Domain Administrator account via RDP. They did this by running a M...
Questions
question
Chemistry, 21.01.2021 23:00
question
Mathematics, 21.01.2021 23:00
question
Mathematics, 21.01.2021 23:00
question
Mathematics, 21.01.2021 23:00