ExamGecko
Question list
Search
Search

Related questions











Question 208 - 200-201 discussion

Report
Export

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?

A.

list of security restrictions and privileges boundaries bypassed

Answers
A.

list of security restrictions and privileges boundaries bypassed

B.

external USB device

Answers
B.

external USB device

C.

receptionist and the actions performed

Answers
C.

receptionist and the actions performed

D.

stolen data and its criticality assessment

Answers
D.

stolen data and its criticality assessment

Suggested answer: C

Explanation:

In the context of a cybersecurity breach, attribution involves identifying the responsible party. Since the external USB device was not found, the focus shifts to the actions performed by the receptionist.Analyzing these actions can provide insights into how the breach occurred and may help in attributing the incident to the threat actor

asked 07/10/2024
BETTE SLETTER
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first