A network security analyst received an alert about a potential malware threat on a user’s computer. what can the analyst review to get detailed information about this compromise?
a. Logs
b. Full disk encryption (FDE)
c. Binary whitelisting software
d. Security Information and Event Management (SIEM) system