subject

A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recent incident. The details of the event indicate: A user received a phishing email that appeared to be a report from the organization's CRM tool.
The user attempted to access the CRM tool via a fraudulent web page but was unable to access the tool
The user, unaware of the compromised account, did not report the incident and continued to use the CRM tool with the original credentials
Several weeks later, the user reported anomalous activity within the CRM tool
Following an investigation, it was determined the account was compromised and an attacker in another country had gained access to the
CRM tool
Following identification of corrupted data and successful recovery from the incident, a lessons learned activity was to be led by the CSO
Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized use of credentials by the attacker?
Security awareness training
Last login verification
Log correlation
Time-of-check controls
Time-of-use controls
WAYF-based authentication

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:00
Two technicians are discussing the common u-joint. technician a says its input and output speeds should be equal. technician b says that it normally has two yokes. which technician is correct?
Answers: 1
question
Computers and Technology, 23.06.2019 06:40
How many nibbles can be stored in a 16-bit word?
Answers: 1
question
Computers and Technology, 24.06.2019 11:00
These statements describe lists in presentation programs: a. bullets can be turned off and on. b. bullets cannot be turned off. c. bullet styles, colors, and sizes can be changed. d. lists don't have to use bullets or numbers. e. numbering styles, colors, and sizes can be changed. f. numbers can be turned off and on. g. numbers cannot be turned off. select all that apply
Answers: 2
question
Computers and Technology, 24.06.2019 17:30
What is the next step if your volume does not work on computer
Answers: 2
You know the right answer?
A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recen...
Questions
question
Mathematics, 23.04.2021 02:20
question
Mathematics, 23.04.2021 02:20
question
Mathematics, 23.04.2021 02:20
question
Mathematics, 23.04.2021 02:20
question
English, 23.04.2021 02:20
Questions on the website: 13722363