subject

A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recent incident. The details of the event indicate: A user received a phishing email that appeared to be a report from the organization's CRM tool.
The user attempted to access the CRM tool via a fraudulent web page but was unable to access the tool
The user, unaware of the compromised account, did not report the incident and continued to use the CRM tool with the original credentials
Several weeks later, the user reported anomalous activity within the CRM tool
Following an investigation, it was determined the account was compromised and an attacker in another country had gained access to the
CRM tool
Following identification of corrupted data and successful recovery from the incident, a lessons learned activity was to be led by the CSO
Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized use of credentials by the attacker?
Security awareness training
Last login verification
Log correlation
Time-of-check controls
Time-of-use controls
WAYF-based authentication

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:00
Is the following sentence true or false? during meiosis, the two alleles for each gene stay together.
Answers: 3
question
Computers and Technology, 22.06.2019 10:30
Choose the best explanation for the following statement communication is symbolic
Answers: 3
question
Computers and Technology, 23.06.2019 12:30
Animations and transitions are added from the
Answers: 1
question
Computers and Technology, 24.06.2019 09:00
Why might you chose to crest a function resume
Answers: 1
You know the right answer?
A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recen...
Questions
Questions on the website: 13722363