Multiple Choice
A security analyst is reviewing logs and sees a former employee's account has been used to access critical information on a private cloud resource. The analyst examines firewall and IPS logs but does not find traffic that is relevant to the breach. Which of the following is the MOST likely source of the compromise?
A) External attack
B) Internal role change
C) External privilege escalation
D) Internal attack
Correct Answer:

Verified
Correct Answer:
Verified
Q284: A cloud administrator is troubleshooting a network
Q285: An automation performs the following on a
Q286: A cloud administrator has deployed a new
Q287: An administrator needs to make a file-level
Q288: A system's application servers need to be
Q289: In a private cloud environment, which of
Q291: A cloud administrator has configured a connection
Q292: A company is seeking a new backup
Q293: In an IaaS environment, the security team
Q294: To enhance availability, a company has expanded