DRAG DROP
A security auditor is reviewing the following output from file integrity monitoring software installed on a very busy server at a large service provider. The server has not been updates since it was installed.
Drag and drop the log entry that identifies the first instance of server compromise.
Answer: