Refer to the exhibit.
An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?
Lore
5 months agoGladys
5 months agoHorace
5 months agoTamar
5 months agoMicah
5 months agoJunita
4 months agoAn
5 months agoShenika
5 months agoBuck
6 months agoKaran
6 months agoCarli
5 months agoYolando
5 months ago