Questions
Questions

Introduction to Security and Forensic Technologies (052025-MHH) Case study: Office 365 - A Favorite for Cyberattack Persistence (IAM)

Multiple dropdown selections

Question 1: Threat actors exploit Blank 1 Question 16[select: , Office 365, eDiscovery, OAuth, Power Automate] to launch cyberattacks on remote workers during the COVID-19 pandemic. Question 2: Attackers exploit three key features of Office 365 to perform a variety of attacks: Blank 2 Question 16[select: , Office 365, eDiscovery, OAuth, Power Automate] , Power Automate, and OAuth. Question 3: Blank 3 Question 16[select: , Office 365, eDiscovery, OAuth, Power Automate] is an open standard for access authentication used in Office 365 that attackers exploit to maintain persistent and undetected access to accounts. Question 4: Blank 4 Question 16[select: , Office 365, eDiscovery, OAuth, Power Automate] is a feature in Office 365 that lets users create custom integrations and automated workflows between applications, and is exploited by attackers for command and control and lateral movement in cyberattacks.

View Explanation

View Explanation

Verified Answer
Please login to view
Step-by-Step Analysis
Question analysis begins by identifying what each blank is asking for and which option best fits that blank. Blank 1 options: Office 365, eDiscovery, OAuth, Power Automate - Office 365: The statement says threat actors exploit Blank 1 to launch cyberattacks on remote workers during the COVID-19 pandemic. Using the platform itself (Office 365) as the initial attack surface makes sense because attackers often target cloud-enabled work environments and tenant configurations to gain access to accounts and services used by remote workers. This framing aligns with a broad platform-based attack surface where attackers abuse legitimate services. - eDiscovery: This feature is primarily a data-search tool within Office 365 used for e-discovery processes. While it has security implications, it is not commonly described as the initial vector attackers exploit to launch attacks on remote workers. - OAuth: OAuth is an open authentication standard that attackers might abuse to gain access tokens, but in the context of the blank as a launcher for cyberattacks against remote workers during the pandemic, the que......Login to view full explanation

Log in for full answers

We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!

Similar Questions

More Practical Tools for Students Powered by AI Study Helper

Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!