1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes....
1.1 – Given a scenario, install and configure laptop hardware and components, 1.2 – Given a scenario, install components within the display of a laptop, 1.3 – Given a scenario, use appropriate laptop features...