An analyst is part of a team that is investigating a potential breach of sensitive data at a large financial services organization. The organization suspects a breach occurred when proprietary data was disclosed to the public. The team finds servers were accessed using shared credentials that have been in place for some time. In addition, the team discovers undocumented firewall rules, which provided unauthorized external access to a server. Suspecting the activities of a malicious insider threat, which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
hlwo
Highly Voted 4 years, 7 months agoPQwesi
Most Recent 4 years, 1 month agoFunkydave
4 years agoVoltron8477
4 years, 2 months agoOkponglo007
4 years, 2 months agoexiledwl
4 years, 4 months ago