Refer to the exhibit.
An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?
Doyle
2 months agoBlondell
3 days agoGerman
19 days agoStephanie
28 days agoVeronika
1 months agoDick
2 months agoJoanne
2 months agoSol
2 months agoSina
2 months agoJohnathon
2 months agoJohanna
28 days agoJohnetta
1 months agoAdela
1 months agoBrinda
2 months agoDick
2 months agoJoanne
2 months agoMarquetta
3 months agoMichell
22 days agoPeggie
25 days agoYolande
1 months agoCatrice
1 months agoTamie
2 months agoBilly
2 months agoTitus
2 months agoFletcher
2 months agoJenelle
3 months agoYesenia
2 months agoKimi
2 months agoJunita
2 months agoLauran
2 months ago