I practiced a question similar to this, and I think corrective controls are about responding to incidents. Maybe option B is the right choice since it logs attempts for later investigation?
Hmm, I'm a bit confused on this one. I'm not sure if the trap source address needs to match the NMS address or if there's some other requirement. I'll have to think this through carefully.
Okay, I've got this! Scraping social media and using WHOIS lookup tools are definitely the way to go here. They'll allow me to quickly gather email addresses without raising any red flags with the client's cybersecurity measures.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Noelia
4 months agoSilva
4 months agoEarleen
4 months agoGabriele
4 months agoErin
4 months agoRashad
5 months agoDeeanna
5 months agoLajuana
5 months agoLauna
5 months agoWhitley
5 months agoTherese
5 months agoKrystina
5 months ago