Multiple Choice
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network. Which testing method did the intruder use?
A) social engineering
B) eavesdropping
C) piggybacking
D) tailgating
Correct Answer:

Verified
Correct Answer:
Verified
Q76: Which security technology allows only a set
Q77: What does cyber attribution identify in an
Q78: What is a benefit of agent-based protection
Q79: A SOC analyst is investigating an incident
Q80: What is the difference between deep packet
Q82: An engineer runs a suspicious file in
Q83: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q84: What is the difference between the ACK
Q85: Which process is used when IPS events
Q86: An organization has recently adjusted its security