Cisco 300-215 Question Answer
During a routine inspection of system logs, a security analyst notices an entry where Microsoft Word initiated a PowerShell command with encoded arguments. Given that the user's role does not involve scripting or advanced document processing, which action should the analyst take to analyze this output for potential indicators of compromise?
Cisco 300-215 Summary
- Vendor: Cisco
- Product: 300-215
- Update on: Jul 29, 2025
- Questions: 115