A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file download from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker MOST likely use to gain access?
CoRell
Highly Voted 5 years agovaxakaw829
5 years agohlwo
Highly Voted 4 years, 10 months agoPoker69
4 years, 8 months agoKelvinYau
Most Recent 9 months, 3 weeks agoEromons
1 year, 2 months agochiachuang
1 year, 10 months agoAyo2023
2 years, 7 months agoMarciaL
2 years, 10 months agofonka
4 years, 1 month agoDion79
4 years, 2 months agoStickyMac
4 years, 2 months agoComputerguy
4 years, 3 months agoCryptomike87
4 years, 4 months agoPQwesi
4 years, 4 months agocoti94
4 years, 5 months agonakres64
4 years, 5 months agoyalight
4 years, 7 months agoexiledwl
4 years, 7 months agocertpro
4 years, 8 months agoJosePulickal
4 years, 7 months ago