As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.
<h3>
What is indicators?</h3>
System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.
IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.
Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.
Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.
To learn more about indicators, refer to the link:
brainly.com/question/28093573
#SPJ1
Answer: b)It helps to engage workers in continuous improvement activities.
Explanation: Poke-yoke method was the technique to eliminate the mistakes that happen in a manufacturing process. It helps in avoiding the issues in the product and correcting those errors.
Mistake proofing is the mechanism of this methods that ensures about the product manufactured is safe from any failure and defects.It alerts the workers to improve the product through their working.
Other options are incorrect because it was developed by Shigeo Shingo , they had easy mechanism and feedback system did not told the workers about defects.Thus, the correct option is option(b).
Cross-platform.
--------------------