Which example illustrates how malware might be concealed?

IT Questions BankCategory: CCNA CyberOpsWhich example illustrates how malware might be concealed?
Which example illustrates how malware might be concealed? 1IT Administrator Staff asked 10 months ago

Which example illustrates how malware might be concealed?
CyberOps Associate (Version 1.0) - Modules 1 - 2: Threat Actors and Defenders Group Exam

  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
  • A botnet of zombies carry personal information back to the hacker.
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

Explanation: An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
More Questions: Modules 1 – 2: Threat Actors and Defenders Group Exam
More Questions: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments