Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
The observed activity from a privileged account, which includes accessing emails and sensitive information, modifying audit logs, and abnormal login times, best fits the description of:
D. Insider attack.
An insider attack occurs when a person with authorized access to an organization's systems and data misuses that access for malicious purposes. In this scenario, the activity observed suggests that a privileged insider, who has access to sensitive information and has the ability to modify audit logs, is engaging in unauthorized and potentially malicious actions. The abnormal login times further indicate suspicious behavior associated with the privileged account.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
glenndexter
1 week, 3 days ago