Refer to the exhibit.
An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior. Which type of compromise is occurring?
Leatha
8 days agoShonda
10 days agoLeonor
14 days agoJenifer
15 days agoAshlyn
5 days agoMiss
23 days ago