Discussion Post: Log Analysis in Linux and Splunk Lab
a) Identify the location used by a malicious actor to stage data. Be specific.
b) Describe the type of data that was staged.
c) Apply the information learned to evaluate why that location was used.
d) Apply the information learned to evaluate why the data were staged rather than immediately exfiltrated.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.