While investigating suspicious activity on a server, a security administrator runs the following report:
In addition, the administrator notices changes to the /etc/shadow file that were not listed in the report.
Which of the following BEST describe this scenario? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AB.