2.4 Indicators of malicious activity

Question goes here


Info goes here