An application server runs slowly and then triggers a high CPU alert.
After investigating, a security analyst finds an unauthorized program is running on the server.
The analyst reviews the application log below.
Which of the following conclusions is supported by the application log?
Click on the arrows to vote for the correct answer
A. B. C. D.C.