List of questions
Related questions
Question 560 - SY0-601 discussion
A security analyst it investigating an incident to determine what an attacker was able to do on a compromised Laptop. The analyst reviews the following SIEM log:
Which of the following describes the method that was used to compromise the laptop?
A.
An attacker was able to move laterally from PC 1 to PC2 using a pass-the-hash attach
B.
An attacker was able to bypass the application approve list by emailing a spreadsheet. attachment with an embedded PowerShell in the file.
C.
An attacker was able to install malware to the CAasdf234 folder and use it to gain administrator rights and launch Outlook
D.
An attacker was able to phish user credentials successfully from an Outlook user profile
Your answer:
0 comments
Sorted by
Leave a comment first