Question

In: Other

An attacker has obtained the user ID and password of a data center's backup operator and...

An attacker has obtained the user ID and password of a data center's backup operator and has gained access to a production system. Which of the following would be the attacker's NEXT action?

A.Perform a passive reconnaissance of the network.

B.Initiate a confidential data exfiltration process

C.Look for known vulnerabilities to escalate privileges

D.Create an alternate user ID to maintain persistent access

Solutions

Expert Solution

Solution : The correct answer is “option B”.

Initiate a confidential data exfiltration process.

Explanation :

Data exfiltration is a technique or a security breach that is used by malicious attackers in order to copy, retrieve and transfer the confidential and sensitive data from a target computer or server. Some of the common targets for these types of breach are copying or retrieving the confidential financial records or information about someone’s trade/business secrets and sensitive personal information. Hence, the attacker will quickly try to initiate the data exfiltration process so that he is able to obtain as much as information without getting identified.


Related Solutions

Question3: Consider you have the following data for some user accounts: [6 marks] Username Password User1...
Question3: Consider you have the following data for some user accounts: [6 marks] Username Password User1 101010 User2 112121 User3 211211 User4 312132 1. Write a function called validate which takes 2 arguments: a dictionary, a username, and a password. The function should do the following: [3 marks] Find the given username in the dictionary and compare the given password with the one that belongs to that username in the dictionary. Return true if password is correct and false if...
Professor Nickel is thinking of investing in two stocks: A and B. He has obtained data...
Professor Nickel is thinking of investing in two stocks: A and B. He has obtained data regarding the closing prices of these stocks on n = five days. Professor Nickel has calculated for this data that Sxx = 236.8, Sxy = -282.4, and error variance = 18.81. Day Number --- Stock A price/share (x) --- Stock B price/share (y) 1 --- 91 --- 52 2 --- 85 --- 59 3 --- 75 --- 68 4 --- 72 --- 75 5...
Elsa is a data analytics intern at a financial firm. Her company has obtained their customers...
Elsa is a data analytics intern at a financial firm. Her company has obtained their customers bank transaction records recently. Elsa has been asked by her manager to find out all the attributes (variables) that can be delivered from those bank transaction records for creating the machine learning algorithm. The machine learning algorithm will help Elsa's firm to determine whether someone is likely to get a loan approval or not. List 5 attributes (variables) and explain why they should be...
Problem 1-39 (Static) Cost Data for Managerial Purposes (LO 1-3) Imperial Devices (ID) has offered to...
Problem 1-39 (Static) Cost Data for Managerial Purposes (LO 1-3) Imperial Devices (ID) has offered to supply the state government with one model of its security screening device at “cost plus 20 percent.” ID operates a manufacturing plant that can produce 66,000 devices per year, but it normally produces 60,000. The costs to produce 60,000 devices follow: Total Cost Cost per Device Production costs: Materials $ 4,500,000 $ 75 Labor 9,000,000 150 Supplies and other costs that will vary with...
The LaPann Company has obtained the following sales forecast data: July August September October Cash sales...
The LaPann Company has obtained the following sales forecast data: July August September October Cash sales $80,000 $70,000 $50,000 $60,000 Credit sales 240,000 220,000 180,000 200,000 The regular pattern of collection of credit sales is 20% in the month of sale, 70% in the following the month of sale and the remainder in the second month following the month of sale. There are no bad debts. The budgeted accounts receivable balance on September 30 would be:
The data below were obtained to predict the sound frequency to which a person’s ear will respond based upon the length of time a person has been exposed to a high level of noise.
The data below were obtained to predict the sound frequency to which a person’s ear will respond based upon the length of time a person has been exposed to a high level of noise. Here “length of exposure” is the amount of time in weeks that a person has been living close to a major airport and the “hearing range” is reported in thousand cycles per second. Length of exposure In weeks (Left) Hearing range In thousand cycles per second...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT