Pre-Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

Lina, a threat responder, uses the Nuix Adaptive Security tool to analyze alerts of suspicious...

Lina, a threat responder, uses the Nuix Adaptive Security tool to analyze alerts of suspicious file uploads. She identifies that an insider used Outlook to send attachments to unknown email addresses during off-hours. The tool captures screenshots, file metadata, and keystroke logs. What type of evidence is Lina primarily relying on?

A.

User behavior analytics and endpoint monitoring

B.

SIEM event correlation

C.

Network forensics logs

D.

Host-based intrusion prevention logs

212-89 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now 212-89 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"