Computers and Technology
Computers and Technology, 08.09.2021 16:00, 20011854

A Chief Security Officer (CSO) is reviewing the organizationג€™s incident response report from a recent incident. The details of the event indicate: 1. A user received a phishing email that appeared to be a report from the organizationג€™s CRM tool.
2. The user attempted to access the CRM tool via a fraudulent web page but was unable to access the tool.
3. The user, unaware of the compromised account, did not report the incident and continued to use the CRM tool with the original credentials.
4. Several weeks later, the user reported anomalous activity within the CRM tool.
5. Following an investigation, it was determined the account was compromised and an attacker in another country has gained access to the CRM tool.
6. Following identification of corrupted data and successful recovery from the incident, a lessons learned activity was to be led by the CSO.

Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized use of credentials by the attacker?
a. Security awareness training
b. Last login verification
c. Log correlation
d. Time-of-check controls
e. Time-of-use controls
f. WAYF-based authentication

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 10:30, badpotterchris
How would you categorize the software that runs on mobile devices? break down these apps into at least three basic categories and give an example of each.
Answers: 1
image
Computers and Technology, 23.06.2019 21:50, Trinhphuongtran
Description: write function lastfirst() that takes one argument—a list of strings of the format "lastname, firstname" —and returns a list consisting of two lists: (a) a list of all the last names (b) a list of all the first names
Answers: 2
image
Computers and Technology, 24.06.2019 07:00, jordaaan101
Guys do you know sh27 cause he hacked me : ( pidgegunderson my old user
Answers: 2
image
Computers and Technology, 24.06.2019 11:00, abolton04
In three to five sentences, describe how you can organize written information logically and sequentially
Answers: 1
Do you know the correct answer?
A Chief Security Officer (CSO) is reviewing the organizationג€™s incident response report from a rec...

Questions in other subjects:

Konu
Mathematics, 05.03.2021 01:00
Konu
Mathematics, 05.03.2021 01:00
Konu
Mathematics, 05.03.2021 01:00
Konu
Geography, 05.03.2021 01:00