Which of the following is the MOST likely source of the compromise?

A security analyst is reviewing logs and sees a former employee’s account has been used to access critical information on a private cloud resource. The analyst examines firewall and IPS logs but does not find traffic that is relevant to the breach.

Which of the following is the MOST likely source of the compromise?
A . External attack
B . Internal role change
C . External privilege escalation
D . Internal attack

Answer: D

Latest CV0-002 Dumps Valid Version with 328 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments