Which example illustrates how malware might be concealed?

IT Questions BankCategory: CCNA CyberOpsWhich example illustrates how malware might be concealed?

Which example illustrates how malware might be concealed?
CyberOps Associate (Version 1.0) - Modules 1 - 2: Threat Actors and Defenders Group Exam

  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
  • A botnet of zombies carry personal information back to the hacker.
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

Explanation: An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
Exam with this question: Modules 1 - 2: Threat Actors and Defenders Group Exam
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
Exam with this question: Introduction to Cybersecurity Chapter 2 Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x