Scott notices that one of the systems on his network contacted a number of systems via encrypted web traffic, downloaded a handful of files, and then uploaded a large amount of data to a remote system. what type of infection should he look for
This is a behavior of a bot infection the bot was likely to contact command and control hosts then download updates and or additional updates and or additional data packages then upload data from his organization.