ECCouncil 312-85 Question Answer
Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.
Which of the following key indicators of compromise does this scenario present?
ECCouncil 312-85 Summary
- Vendor: ECCouncil
- Product: 312-85
- Update on: Dec 16, 2025
- Questions: 87

