Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 4 Question 74 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 74
Topic #: 4
[All 212-89 Questions]

Sam. an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization. How can you categorize this type of incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Shally has incorporated the Defense-in-depth strategy into the incident response plan for Texas Pvt. Ltd. Defense-in-depth is a layered security approach that involves implementing multiple security measures and controls throughout an information system. This strategy is designed to provide several defensive barriers to protect against threats and attacks, ensuring that if one layer is compromised, others still provide protection. The goal is to create a multi-faceted defense that addresses potential vulnerabilities in various areas, including physical security, network security, application security, and user education. Reference: The Incident Handler (ECIH v3) courses and study guides often emphasize the importance of a Defense-in-depth strategy in creating robust security infrastructures to protect against a wide range of cyber threats.


Contribute your Thoughts:

Carissa
21 days ago
Network intrusion? More like 'network infraction'! Sam's gonna be in hot water for this one.
upvoted 0 times
...
Graham
27 days ago
Haha, Sam's really going for the 'denial-of-service' on his company's reputation with this stunt. Good luck explaining that one to HR!
upvoted 0 times
Judy
10 days ago
Sam is really playing with fire by spoofing the company's email address.
upvoted 0 times
...
Jean
17 days ago
That's definitely an inappropriate usage incident.
upvoted 0 times
...
...
Chantell
1 months ago
I'd say it's an inappropriate usage incident. Sending spoofed emails is just bad form, even if it's not technically a breach.
upvoted 0 times
Kendra
17 days ago
C) It could also be considered unauthorized access, since he's pretending to be someone he's not.
upvoted 0 times
...
Simona
23 days ago
B) I agree, it's definitely not the right way to communicate.
upvoted 0 times
...
Serina
24 days ago
A) Inappropriate usage incident.
upvoted 0 times
...
...
Luisa
2 months ago
This is clearly an unauthorized access incident. Sam is impersonating his organization, which is a big no-no.
upvoted 0 times
Nilsa
24 days ago
I agree, it's a serious violation. He could be causing harm to his organization's reputation.
upvoted 0 times
...
Catarina
1 months ago
That's definitely an unauthorized access incident. Sam should not be spoofing his organization's email address.
upvoted 0 times
...
...
Jesus
2 months ago
I think it could also be considered as inappropriate usage incident.
upvoted 0 times
...
Odelia
2 months ago
I agree with Pearly, it's a serious breach of security.
upvoted 0 times
...
Pearly
2 months ago
That's definitely unauthorized access incident.
upvoted 0 times
...

Save Cancel