Multiple Choice
A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one week earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
A) Man-in-the-middle
B) Spear phishing
C) Evil twin
D) DNS poisoning
Correct Answer:

Verified
Correct Answer:
Verified
Q25: The Chief Financial Officer (CFO) of an
Q26: A company is adopting a BYOD policy
Q27: Phishing and spear-phishing attacks have been occurring
Q28: A security audit has revealed that a
Q29: Which of the following are requirements that
Q31: A company has drafted an insider-threat policy
Q32: A user enters a password to log
Q33: A company recently moved sensitive videos between
Q34: The IT department at a university is
Q35: A public relations team will be taking