A cybersecurity analyst is retained by a firm for an open investigation. Upon arrival, the cybersecurity analyst reviews several security logs.
Given the following snippet of code:
Which of the following combinations BEST describes the situation and recommendations to be made for this situation?
A.
The cybersecurity analyst has discovered host 192.168.0.101 using Windows Task Scheduler at 13:30 to
runnc.exe; recommend proceeding with the next step of removing the host from the network.
B.
The cybersecurity analyst has discovered host 192.168.0.101 to be running thenc.exe file at 13:30 using the
auto cron job remotely, there are no recommendations since this is not a threat currently.
C.
The cybersecurity analyst has discovered host 192.168.0.101 is beaconing every day at 13:30 using
thenc.exe file; recommend proceeding with the next step of removing the host from the network.
D.
The security analyst has discovered host 192.168.0.101 is a rogue device on the network, recommend
proceeding with the next step of removing the host from the network.
Explanation: