An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?
What is the difference between statistical detection and rule-based detection models?
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?