Question 31

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email.
When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
  • Question 32

    What is an attack surface as compared to a vulnerability?
  • Question 33

    Refer to the exhibit.

    What information is depicted?
  • Question 34

    Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?
  • Question 35

    Refer to the exhibit.

    Which type of log is displayed?