ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 111 - SY0-701 discussion

Report
Export

An administrator discovers that some files on a database server were recently encrypted. The administrator sees from the security logs that the data was last accessed by a domain user. Which of the following best describes the type of attack that occurred?

A.
Insider threat
Answers
A.
Insider threat
B.
Social engineering
Answers
B.
Social engineering
C.
Watering-hole
Answers
C.
Watering-hole
D.
Unauthorized attacker
Answers
D.
Unauthorized attacker
Suggested answer: A

Explanation:

An insider threat is a type of attack that originates from someone who has legitimate access to an organization's network, systems, or data. In this case, the domain user who encrypted the files on the database server is an example of an insider threat, as they abused their access privileges to cause harm to the organization. Insider threats can be motivated by various factors, such as financial gain, revenge, espionage, or sabotage.

asked 02/10/2024
Ramzi Smair
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first