Which example illustrates how malware might be concealed?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:May 6, 2023
  • Reading time:2 mins read

Which example illustrates how malware might be concealed?

Modules 1 - 2 Threat Actors and Defenders Group Exam Answers 01
Modules 1 – 2 Threat Actors and Defenders Group Exam Answers 01
  • A botnet of zombies carry personal information back to the hacker.
  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
    Answers Explanation & Hints:

    An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.

For more Questions and Answers click the link below:

Cyberops Associate Modules 1 – 2: Threat Actors and Defenders Group Exam Answers Full 100% 2023

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments