An organization's IT team detects unusual data transfer activities from a top executive's account during non-working hours. This could be indicative of:
- Data Theft
- Routine Maintenance
- System Upgrade
- Unauthorized Access
Unusual data transfer activities from a top executive's account during non-working hours can be indicative of data theft, which is a significant security concern.
Loading...
Related Quiz
- Which term describes the combination of the software and hardware that a user interacts with in a cloud service?
- Which service model is most appropriate for businesses that have significant existing investments in software licenses and want to maintain a higher degree of control over their application environment?
- When discussing cloud security, the process of ensuring that only authorized entities can access specific resources is known as:
- The process where an ML model is initially trained on a large dataset and then fine-tuned for a specific task using a smaller dataset is called ________.
- Phishing attacks primarily target which aspect of cloud accounts for hijacking?