题目
Introduction to Security and Forensic Technologies (052025-MHH) Case study: Office 365 - A Favorite for Cyberattack Persistence (IAM)
匹配题
Match the descriptions or examples with the crucial aspects from this cyberattack tactics. 1: It searches across Office 365 applications and data and exports the results. Once inside Office 365, attackers are using this feature as an internal reconnaissance and data exfiltration tool to find critical data to steal that can be used with malicious intent. ____ 2: Lets users create custom integrations and automated workflows between Office 365 applications. It is enabled by default, and includes connectors to hundreds of third-party applications and services—also giving it appeal for both users and hackers. ____ 3: Attackers steal credentials or access them by convincing a legitimate user to approve a malicious app (via phishing email). This can allow attackers to maintain persistent and undetected access to Office 365 accounts ____
选项
A.OAuth
B.eDiscovery
C.Power Automate
查看解析
标准答案
Please login to view
思路分析
To tackle this matching task, I’ll examine each description and connect it to the most fitting Office 365 tactic.
Option set context: The three items to match are eDiscovery, Power Automate, and OAuth. The available choices present the three terms in a different order: OAuth, eDiscovery, Power Automate.
Description 1: It searches across Office 365 applications and data and exports the results. Once inside Office 365, attackers are using this feature as an internal reconnaissance and data exfiltration tool to find critical data to steal that can be used with malicious intent.
- This description aligns with eDiscovery, which i......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
An MIS professional is tasked with evaluating the security risks of a new cloud-based software system. They need to find comprehensive information on industry best practices for cloud security, relevant regulatory compliance standards, and potential vulnerabilities specific to the chosen software. Which combination of resources would be most effective for this research?
An Amazon EC2 security group cannot filter based on which of the following? [1 Mark]
What involves applications such as anti-virus software delivered over the Internet with constant virus definitions updates that are not reliant on user compliance?
Which service enables you to review the security of your Amazon S3 buckets by checking for open access permissions?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!