Tento prohlížeč se už nepodporuje.
Upgradujte na Microsoft Edge, abyste mohli využívat nejnovější funkce, aktualizace zabezpečení a technickou podporu.
What is a lateral movement path?
A potential link between two accounts caused by sharing access to resources.
A means of transferring data from a machine on one network to a machine on another network.
A mechanism for decrypting data that doesn't require an encryption key.
What is the exfiltration phase?
When an attacker attempts to guess your users' user names in your domain by sending sign-in requests to see which credentials works.
When an attacker transfers account and security data to an off-site location for subsequent use.
When an attacker modifies the security structure of the domain, replace encryption keys, grant and deny rights to users, and read or write any data in the domain.
You're investigating an attack associated with a specific user account. Which fact about the account should you consider suspicious?
The user account has been used to sign into a single computer.
The user has failed to sign in twice in the past hour.
The user account has low privileges on the local computer but high-level access to a spreadsheet on a shared folder.
You must answer all questions before checking your work.
Continue
Byla tato stránka užitečná?