Which of the following best describes an Indicator of Compromise (IoC)?
A protocol used to encrypt data in transit
A tool designed to prevent unauthorized access to network resources
A document outlining the steps for incident response
A piece of forensic data that identifies potentially malicious activity