Takumi works for a large movie studio. He receives an alert…

Takumi works for a large movie studio. He receives an alert from a monitoring system that their servers are under attack after the studio announces a movie that parodies a foreign leader. The traffic appears to be coming from that specific country. Which of the following threat actor types is most likely the source of the attack?

A large e-commerce company suddenly experiences a surge of t…

A large e-commerce company suddenly experiences a surge of traffic, overwhelming its web servers and making legitimate customer requests fail. Investigation shows the incoming packets originate from thousands of compromised IoT devices sending repetitive requests. Which of the following best describes this type of attack?

Bettye manages a server for which a major vulnerability was…

Bettye manages a server for which a major vulnerability was recently reported in one of the services that her company uses. However, a patch currently is not available to fix the vulnerability, so she needs to ensure that the firewall and other protections in place will prevent a threat actor from exploiting the vulnerability. Which of the following describes the type of vulnerability on the server she manages?

Tyrese, a cybersecurity analyst, is performing an audit of u…

Tyrese, a cybersecurity analyst, is performing an audit of user accounts when he discovers a handful of accounts that do not appear to represent actual employees at his organization. As he continues to investigate, he finds the accounts were created around four months ago and only connect to resources from outside the network. Which of the following might he have discovered?