What is an indicator of compromise (IOC)? Provide at least four examples of different kinds of actionable
indicators of compromise and explain how they are implemented by enterprise cybersecurity teams. Note:
Much like in the discussion board posting, I am not looking for behavioral indicators