Which example illustrates how malware might be concealed?

Last Updated on November 4, 2020 by Admin

Which example illustrates how malware might be concealed?

Modules 1 - 2 Threat Actors and Defenders Group Exam Answers 01

Modules 1 – 2 Threat Actors and Defenders Group Exam Answers 01

  • A botnet of zombies carry personal information back to the hacker.
  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
    Answers Explanation & Hints:

    An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.

For more question and answers:

Click Here CA – CyberOps Associate v1.0 – Modules 1 – 2: Threat Actors and Defenders Group Exam Answers Full 100%

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments