Solved

A Security Engineer Is Reviewing Log Files After a Third

Question 30

Multiple Choice

A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one week earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?


A) Man-in-the-middle
B) Spear phishing
C) Evil twin
D) DNS poisoning

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions