A security analyst is reviewing logs and sees a former employee's account has been used to access critical information on a private cloud resource. The analyst examines firewall and IPS logs but does not find traffic that is relevant to the breach. Which of the following is the MOST likely source of the compromise?
A) External attack
B) Internal role change
C) External privilege escalation
D) Internal attack
Correct Answer:
Verified
Q250: A cloud administrator is configuring a bastion
Q251: A cloud service company is proposing a
Q252: A company has been migrating a significant
Q253: A company wants to set up a
Q254: A new SaaS timecard application that is
Q256: A Type 1 hypervisor has the following
Q257: All the virtual server instances within an
Q258: A cloud administrator is provisioning five VMs,
Q259: The sales department is preparing to launch
Q260: A security administrator wants to automate the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents