A company's IT department is alerted to abnormal network behavior. Upon inspecting system logs from network devices, analysts observe numerous failed authentication attempts to a key resource followed by an unexpected, successful sign-in during off-hours. None of the attempts correlate with standard user activities or scheduled jobs. What does this scenario most likely suggest?
An external brute force attack might have occurred, leading to unauthorized access with higher-level privileges.
A periodic system update task could have triggered the sequence of sign-in attempts, eventually gaining access.
The resource was rebooting multiple times, causing a series of access entries from the management console.
The legitimate user of the resource might have had trouble remembering their credentials and finally logged in successfully.