List of questions
Related questions
Question 129 - SY0-601 discussion
An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:
• Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.
• Internal users in question were changing their passwords frequently during that time period.
• A jump box that several domain administrator users use to connect to remote devices was recently compromised.
• The authentication method used in the environment is NTLM. Which of the following types of attacks is MOST likely being used to gain unauthorized access?
A.
Pass-the-hash
B.
Brute-force
C.
Directory traversal
D.
Replay
Your answer:
0 comments
Sorted by
Leave a comment first