subject

A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recent incident. The details of the event indicate: A user received a phishing email that appeared to be a report from the organization's CRM tool.
The user attempted to access the CRM tool via a fraudulent web page but was unable to access the tool
The user, unaware of the compromised account, did not report the incident and continued to use the CRM tool with the original credentials
Several weeks later, the user reported anomalous activity within the CRM tool
Following an investigation, it was determined the account was compromised and an attacker in another country had gained access to the
CRM tool
Following identification of corrupted data and successful recovery from the incident, a lessons learned activity was to be led by the CSO
Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized use of credentials by the attacker?
Security awareness training
Last login verification
Log correlation
Time-of-check controls
Time-of-use controls
WAYF-based authentication

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:30
Asoftware company hired ray, a college graduate to work in their development team. ray is assigned to work in the coding phase of a project. what happens during the coding phase of a software development project? a. the customer receives a working model of the software. b. developers convert the program design into code. c. developers gather requirements directly from the stakeholders. d. testing teams check the product for quality.
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
What is the name of the sound effect that danny hears
Answers: 1
question
Computers and Technology, 23.06.2019 19:30
Anul 2017 tocmai s-a încheiat, suntem trişti deoarece era număr prim, însă avem şi o veste bună, anul 2018 este produs de două numere prime, 2 şi 1009. dorel, un adevărat colecţionar de numere prime, şi-a pus întrebarea: “câte numere dintr-un interval [a,b] se pot scrie ca produs de două numere prime? “.
Answers: 1
question
Computers and Technology, 25.06.2019 00:40
Roger ginde is developing a program in supply chain management certification for managers. ginde has listed a number of activities that must be completed before a training program of this nature could be conducted. the activities, immediate predecessors, and times appear in the accompanying table: activity immediate predecessor(s) time (days) a -− 44b -− 55 c -− 11 d b 1010 e a, d 55 f c 55 g e, f 1010 calculate the slack time. show the details.
Answers: 2
You know the right answer?
A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recen...
Questions
question
Mathematics, 30.10.2019 13:31