List of questions
Related questions
Question 239 - CS0-003 discussion
A security analyst observed the following activity from a privileged account:
. Accessing emails and sensitive information
. Audit logs being modified
. Abnormal log-in times
Which of the following best describes the observed activity?
A.
Irregular peer-to-peer communication
B.
Unauthorized privileges
C.
Rogue devices on the network
D.
Insider attack
Your answer:
0 comments
Sorted by
Leave a comment first