Which of the following examples illustrates how malware might be concealed?
- A botnet of zombies carry personal information back to the hacker
- A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site
- An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors
- An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
Explanation: A bot computer is typically infected by visiting an unsafe website or opening an infected email attachment or infected media file.
Exam with this question: Module 2: Attacks, Concepts and Techniques Quiz Answers
Please login or Register to submit your answer