题目
题目

Introduction to Security and Forensic Technologies (052025-MHH) Case study: Office 365 - A Favorite for Cyberattack Persistence (IAM)

匹配题

Match the descriptions or examples with the crucial aspects from this cyberattack tactics. 1: It searches across Office 365 applications and data and exports the results. Once inside Office 365, attackers are using this feature as an internal reconnaissance and data exfiltration tool to find critical data to steal that can be used with malicious intent. ____ 2: Lets users create custom integrations and automated workflows between Office 365 applications. It is enabled by default, and includes connectors to hundreds of third-party applications and services—also giving it appeal for both users and hackers. ____ 3: Attackers steal credentials or access them by convincing a legitimate user to approve a malicious app (via phishing email). This can allow attackers to maintain persistent and undetected access to Office 365 accounts ____

选项
A.OAuth
B.eDiscovery
C.Power Automate
查看解析

查看解析

标准答案
Please login to view
思路分析
To tackle this matching task, I’ll examine each description and connect it to the most fitting Office 365 tactic. Option set context: The three items to match are eDiscovery, Power Automate, and OAuth. The available choices present the three terms in a different order: OAuth, eDiscovery, Power Automate. Description 1: It searches across Office 365 applications and data and exports the results. Once inside Office 365, attackers are using this feature as an internal reconnaissance and data exfiltration tool to find critical data to steal that can be used with malicious intent. - This description aligns with eDiscovery, which i......Login to view full explanation

登录即可查看完整答案

我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。

类似问题

更多留学生实用工具

加入我们,立即解锁 海量真题独家解析,让复习快人一步!