Cisco Performing CyberOps Using Core Security Technologies (CBRCOR) 350-201 Question # 18 Topic 2 Discussion

Cisco Performing CyberOps Using Core Security Technologies (CBRCOR) 350-201 Question # 18 Topic 2 Discussion

350-201 Exam Topic 2 Question 18 Discussion:
Question #: 18
Topic #: 2

Refer to the exhibit.

350-201 Question 18

An employee is a victim of a social engineering phone call and installs remote access software to allow an “MS Support” technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee’s laptop and the remote technician’s system?


A.

No database files were disclosed


B.

The database files were disclosed


C.

The database files integrity was violated


D.

The database files were intentionally corrupted, and encryption is possible


Get Premium 350-201 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.