subject

The payroll department has contacted the security team regarding an anomaly with amounts paid via the weekly payroll file. the security analyst is provided the following log from the server.
time source ip
file path action
1/1/16 9: 24: 10 10.10.24.156 c: \ach\payrolll. xls file created
1/1/16 3: 15: 23 172.14.89.12 c: \ach\payrolll. xls file transferred
1/7/16 9: 24: 10 10.10.24.156 c: \ach\payrolll. xls file created
1/7/16 3: 15: 23 172.14.89.12 c: \ach\payrolll. xls file transferred
1/14/16 9: 24: 10 10.10.24.156 c: \ach\payrolll. xls file created
1/14/16 9: 51: 34 10.10.24.156 c: \ach\payrolll. xls file modified
1/14/16 3: 10: 29 172.14.89.12 c: \ach\payrolll. xls transfer failed
1/14/16 4: 10: 52 172.14.89.12 c: \ach\payrolll. xls file transferred
1/21/16 9: 24: 10 10.10.24.156 c: \ach\payrolll. xls file created
1/21/16 3: 45: 01 172.14.89.12 c: \ach\payrolll. xls file transferred
1/28/16 9: 24: 10 10.10.24.156 c: \ach\payrolll. xls file created
1/28/16 9: 45: 23 10.10.24.156 c: \ach\payrolll. xls file modified
1/28/16 10: 23: 52 17.23.45.29 c: \ach\payrolll. xls file modified
1/28/16 3: 22: 15 172.14.89.12 c: \ach\payrolll. xls file transferred
which of the following is the most likely reason for the anomaly?
a. the file was corrupted in transit.
b. the file was transferred to the wrong destination.
c. the connection was refused by the destination.
d. the file was compromised before being sent.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 20:50
What are the advantages of google cloud ?
Answers: 2
question
Computers and Technology, 22.06.2019 02:00
The word ‘play’ comes with many different interpretations and a variety of definitions. discuss some of the various meanings tied to the word play. why is the concept of play thought to be an important addition to the workplace? do some (brief) research online and give an example of how play in the workplace is being done right.
Answers: 2
question
Computers and Technology, 22.06.2019 08:00
What is the algorithm for building a binary tree program
Answers: 2
question
Computers and Technology, 22.06.2019 19:20
Write a program that prompts the user to input a string. the program then uses the function substr to remove all the vowels from the string. for example, if str = "there", then after removing all the vowels, str = "thr". after removing all the vowels, output the string. your program must contain a function to remove all the vowels and a function to determine whether a character is a vowel.
Answers: 2
You know the right answer?
The payroll department has contacted the security team regarding an anomaly with amounts paid via th...
Questions
question
Mathematics, 17.05.2021 18:50
question
Mathematics, 17.05.2021 18:50
question
English, 17.05.2021 18:50
question
Mathematics, 17.05.2021 18:50
question
Mathematics, 17.05.2021 18:50
question
Computers and Technology, 17.05.2021 18:50
Questions on the website: 13722361