Refer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?

IT Questions BankCategory: Cybersecurity EssentialsRefer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?

Refer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?

Junior Cybersecurity Analyst Career Path Exam Q55

  • using an advanced encryption algorithm
  • employing cryptocurrency
  • using fake antivirus software
  • requiring the victim to click a link to clear their system

Explanation: According to the Webroot threat 2020 report, by the mid-2010s, ransomware attackers began using cryptocurrency to make it more difficult for legal authorities to track their activities.

Exam with this question: Cybersecurity Pathway Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments