Which of the following is occurring?

A security audit identifies a number of large email messages being sent by a specific user
from their company email account to another address external to the company. These
messages were sent prior to a company data breach, which prompted the security audit. The
user was one of a few people who had access to the leaked data. Review of the suspect’s
emails show they consist mostly of pictures of the user at various locations during a recent
vacation. No suspicious activities from other users who have access to the data were
discovered. Which of the following is occurring?

A security audit identifies a number of large email messages being sent by a specific user
from their company email account to another address external to the company. These
messages were sent prior to a company data breach, which prompted the security audit. The
user was one of a few people who had access to the leaked data. Review of the suspect’s
emails show they consist mostly of pictures of the user at various locations during a recent
vacation. No suspicious activities from other users who have access to the data were
discovered. Which of the following is occurring?

A.
The user is encrypting the data in the outgoing messages.

B.
The user is using steganography.

C.
The user is spamming to obfuscate the activity.

D.
The user is using hashing to embed data in the emails.



Leave a Reply 0

Your email address will not be published. Required fields are marked *