Refer to the exhibit.
A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?
Delmy
5 months agoNana
5 months agoBelen
5 months agoDelmy
5 months agoCarey
6 months agoVilma
5 months agoRhea
5 months agoMelvin
5 months agoVelda
6 months agoColette
6 months agoMozell
6 months ago