ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 239 - CS0-003 discussion

Report
Export

A security analyst observed the following activity from a privileged account:

. Accessing emails and sensitive information

. Audit logs being modified

. Abnormal log-in times

Which of the following best describes the observed activity?

A.
Irregular peer-to-peer communication
Answers
A.
Irregular peer-to-peer communication
B.
Unauthorized privileges
Answers
B.
Unauthorized privileges
C.
Rogue devices on the network
Answers
C.
Rogue devices on the network
D.
Insider attack
Answers
D.
Insider attack
Suggested answer: D

Explanation:

The observed activity from a privileged account indicates an insider attack, which is when a trusted user or employee misuses their access rights to compromise the security of the organization. Accessing emails and sensitive information, modifying audit logs, and logging in at abnormal times are all signs of malicious behavior by a privileged user who may be trying to steal, tamper, or destroy data, or cover their tracks. An insider attack can cause significant damage to the organization's reputation, operations, and compliance12.

Reference: The Privileged Identity Playbook Guides Management of Privileged User Accounts, How to Track Privileged Users' Activities in Active Directory

asked 02/10/2024
Michael Bodine
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first