200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?

  • A . social engineering
  • B . eavesdropping
  • C . piggybacking
  • D . tailgating
Answer: Option A.
Explanation: 

No answer description available for this question.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker