A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file download from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker MOST likely use to gain access?
CoRell
Highly Voted 4 years, 10 months agovaxakaw829
4 years, 10 months agohlwo
Highly Voted 4 years, 8 months agoPoker69
4 years, 7 months agoKelvinYau
Most Recent 8 months agoEromons
1 year, 1 month agochiachuang
1 year, 8 months agoAyo2023
2 years, 6 months agoMarciaL
2 years, 8 months agofonka
3 years, 11 months agoDion79
4 years agoStickyMac
4 years agoComputerguy
4 years, 1 month agoCryptomike87
4 years, 2 months agoPQwesi
4 years, 3 months agocoti94
4 years, 3 months agonakres64
4 years, 4 months agoyalight
4 years, 6 months agoexiledwl
4 years, 6 months agocertpro
4 years, 6 months agoJosePulickal
4 years, 6 months ago