Certification Practice Exams with Real Test Questions & Answers

Rashid has been working with his customer to iscc video

 ·  PT1H46M27S  ·  EN

cc video for rashid has been working with his customer to understand the Indication of Compromise (IoC) that they have seen within their Security Information

Full Certification Question

Rashid has been working with his customer to understand the Indication of Compromise (IoC) that they have seen within their Security Information and Event Manager (SIEM). The logs show that a bad actor infiltrated their organization through a phishing email. Once the bad actor was in, they traversed the network till they gained access to a firewall. Once they were in the firewall, the bad actor assumed the role the firewall had to access the database. The database was then copied by the bad actor. This is an example of which type of threat?