What type of malware did the specialist discover?Įnd-users at an organization contact the cybersecurity department. If a user's device becomes infected with crypto-malware, which of the following is the best way to mitigate this compromise? Have up-to-date backups.ĭuring an internal investigation, a security specialist discovered a malicious backdoor script on a system administrator's machine that executes if the admin's account becomes disabled. Launch a Distributed Denial of Service (DDoS) attackĮstablish a connection with a Command and Control server If a user's computer becomes infected with a botnet, which of the following can this compromise allow the attacker to do? (Select all that apply.) Which of the following will support the attackers' plan? (Select all that apply.) Specific computers at an organization, to inflict a set of other intrusionĪttacks remotely. Uses low observable characteristic attacksĪn attacker is planning to setup a backdoor that will infect a set of What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.) How would an IT security specialist classify these programsĪ fileless malicious software can replicate between processes in memory on a local host or over network shares. After powering on the laptop for the first time, the user noticed a few programs like Norton Antivirus asking for permission to install. What type of virus is this A wormĪ user purchased a laptop from a local computer shop. What most likely happened to cause these issuesĪ security operations center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices a rapid consumption of network bandwidth, causing a Denial of Service (DoS). exe extension installer file, the user experienced frequent crashes, slow computer performance, and strange services running when turning on the computer. Some useful quizlets to help with hard ones include: flash-cards/ Ī user used an administrator account to download and install a software application. Keep in mind that as you read the questions and the answers, try to research the questions and answers to understand both the questions and answers - what they mean. Domain 1.0 Attacks, Threats, and Vulnerabilities Assessment
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |