Refer to the exhibit. An employee is a victim of a social engineering phone call and installs remote access software to allow an `MS Support` technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee's laptop and the remote technician's system?
DrVoIP
9 months, 3 weeks agoETSec
10 months, 3 weeks agoMedjai89
11 months, 2 weeks agojaciro11
1 year, 3 months agochongchangchi
1 year, 8 months agojaciro11
1 year, 3 months agoBobster02
2 years ago