• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which example illustrates how malware might be concealed?

Modules 1 - 2 Threat Actors and Defenders Group Exam Answers 01
Modules 1 – 2 Threat Actors and Defenders Group Exam Answers 01
  • A botnet of zombies carry personal information back to the hacker.
  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Answers Explanation & Hints:

An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.

For more Questions and Answers:

CA – CyberOps Associate v1.0 – Modules 1 – 2: Threat Actors and Defenders Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments