A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one week earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
A) Man-in-the-middle
B) Spear phishing
C) Evil twin
D) DNS poisoning
Correct Answer:
Verified
Q57: A company has limited storage space available
Q58: Under GDPR, which of the following is
Q59: A user enters a password to log
Q60: Which of the following describes the BEST
Q61: A company uses wireless for all laptops
Q63: Which of the following are requirements that
Q64: A Chief Information Security Officer (CISO) is
Q65: A network administrator is setting up wireless
Q66: A company is designing the layout of
Q67: Company engineers regularly participate in a public
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents