Which example illustrates how malware might be concealed?
- A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
- An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
- A botnet of zombies carry personal information back to the hacker.
- An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Explanation: An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
More Questions: Modules 1 – 2: Threat Actors and Defenders Group Exam
More Questions: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers