Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log:
tableHostEvent IDEvent source,DescriptionPCtableMicrosoftwindowsSoftwareRestrictionpoliciestableC: asdf asdf exewas blocked by GrouppolicyPCtableMicrosoftWindowsSecurityAuditingtableA new process has beencreatedNew ProcessName:powershell.exeCreator ProcessName: outlook.exePCtableMicrosoftwindowsSecurityAuditingtableA new process has beencreatedNew Process Name:lat.pslCreator ProcessName:powershell.exePCtableMicrosoftWindowsSecurityAuditingtableAn account failed to logonLogonType: SecurityID:Null SIDWorkstation Name:PCAuthentication PackageName:NTLM
Which of the following describes the method that was used to compromise the laptop?
A An attacker was able to move laterally from PC to PC using a passthehash attack.
B An attacker was able to bypass the application approve list by emailing a spreadsheet attachment with an embedded PowerShell in the file.
C An attacker was able to install malware to the C:lasdif folder and use it to gain administrator rights and launch Outiook.
D An attacker was able to phish user credentials successfully from an Outlook user proflle.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started