Which of the following attacks was MOST likely used?

A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours .

Which of the following attacks was MOST likely used?
A . Man-in- the middle
B . Spear-phishing
C . Evil twin
D . DNS poising

Answer: D

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments