Identify a scenario where two instances of suspicious intrusive activities
Identify a scenario where two instances of suspicious intrusive activities were detected in a computer information
system. The two activities might or might not be of the same type (i.e., spam, phishing, DOS, etc.).