with 100% Correct Answers | Latest Version
(2024/2025) Expert Verified
ATuserTusedTanTadministratorTaccountTtoTdownloadTandTinstallTaTsoftw
areTapplication.TAfterTtheTuserTlaunchedTtheT.exeTextensionTinstallerTfil
e,TtheTuserTexperiencedTfrequentTcrashes,TslowTcomputerTperformanc
e,TandTstrangeTservicesTrunningTwhenTturningTonTtheTcomputer.TWhatT
mostTlikelyThappenedTtoTcauseTtheseTissues?T-TCorrectTAnswer-
TheTuserTinstalledTTrojanThorseTmalware.
ATsecurityToperationsTcenterT(SOC)TanalystTinvestigatesTtheTpropagatio
nTofTaTmemory-
residentTvirusTacrossTtheTnetworkTandTnoticesTaTrapidTconsumptionTofT
networkTbandwidth,TcausingTaTDenialTofTServiceT(DoS).TWhatTtypeTofTv
irusTisTthis?T-TCorrectTAnswer-ATworm
ATuserTpurchasedTaTlaptopTfromTaTlocalTcomputerTshop.TAfterTpowerin
gTonTtheTlaptopTforTtheTfirstTtime,TtheTuserTnoticedTaTfewTprogramsTlik
eTNortonTAntivirusTaskingTforTpermissionTtoTinstall.THowTwouldTanTITTs
ecurityTspecialistTclassifyTtheseTprograms?T-TCorrectTAnswer-
PUPT(potentiallyTunwantedTprogram)
ATfilelessTmaliciousTsoftwareTcanTreplicateTbetweenTprocessesTinTmem
oryTonTaTlocalThostTorToverTnetworkTshares.TWhatTotherTbehaviorsTand
TtechniquesTwouldTclassifyTmalwareTasTfilelessTratherTthanTaTnormalTvi
,rus?T(SelectTallTthatTapply.)T-TCorrectTAnswer--
UsesTlightweightTshellcode
-UsesTlowTobservableTcharacteristicTattacks
AnTattackerTisTplanningTtoTsetTupTaTbackdoorTthatTwillTinfectTaTsetTofTsp
ecificTcomputersTatTanTorganization,TtoTinflictTaTsetTofTotherTintrusionTa
ttacksTremotely.TWhichTofTtheTfollowingTwillTsupportTtheTattackers'Tpla
n?T(SelectTallTthatTapply.)T-TCorrectTAnswer--ComputerTBots,
-CommandT&TControl
IfTaTuser'sTcomputerTbecomesTinfectedTwithTaTbotnet,TwhichTofTtheTfoll
owingTcanTthisTcompromiseTallowTtheTattackerTtoTdo?T(SelectTallTthatTa
pply.)T-TCorrectTAnswer--
LaunchTaTDistributedTDenialTofTServiceT(DDoS)Tattack
-EstablishTaTconnectionTwithTaTCommandTandTControlTserver
-LaunchTaTmass-mailTspamTattack
IfTaTuser'sTdeviceTbecomesTinfectedTwithTcrypto-
malware,TwhichTofTtheTfollowingTisTtheTbestTwayTtoTmitigateTthisTcomp
romise?T-TCorrectTAnswer-HaveTup-to-dateTbackups.
ATsecurityTspecialistTdiscoversTaTmaliciousTscriptTonTaTcomputer.TTheTs
criptTisTsetTtoTexecuteTifTtheTadministrator'sTaccountTbecomesTdisabled
.TWhatTtypeTofTmalwareTdidTtheTspecialistTdiscover?T-TCorrectTAnswer-
ATlogicTbomb
,End-
usersTatTanTorganizationTcontactTtheTcybersecurityTdepartment.TAfterT
downloadingTaTfile,TtheyTareTbeingTredirectedTtoTshoppingTwebsitesTth
eyTdidTnotTintendTtoTnavigateTto,TandTbuilt-
inTwebcamsTturnTon.TTheTsecurityTteamTconfirmsTtheTissueTasTmaliciou
s,TandTnotesTmodifiedTDNST(DomainTNameTSystem)TqueriesTthatTgoTtoT
nefariousTwebsitesThostingTmalware.TWhatTmostTlikelyThappenedTtoTt
heTusers'Tcomputers?T-TCorrectTAnswer-
SpywareTinfectedTtheTcomputers.
AnTattackerTinstallsTTrojanTmalwareTthatTcanTexecuteTremoteTbackdoo
rTcommands,TsuchTasTtheTabilityTtoTuploadTfilesTandTinstallTsoftwareTto
TaTvictimTPC.TWhatTtypeTofTTrojanTmalwareTisTthis?T-TCorrectTAnswer-
ATRemoteTAccessTTrojanT(RAT)
AThackerTisTtryingTtoTgainTremoteTaccessTtoTaTcompanyTcomputerTbyTtr
yingTbruteTforceTpasswordTattacksTusingTaTfewTcommonTpasswordsTinT
conjunctionTwithTmultipleTusernames.TWhatTspecificTtypeTofTpassword
TattackTisTtheThackerTmostTlikelyTperforming?T-TCorrectTAnswer-
PasswordTsprayingTattack
AnTattackerTcanTexploitTaTweaknessTinTaTpasswordTprotocolTtoTcalculat
eTtheThashTofTaTpassword.TWhichTofTtheTfollowingTcanTtheTattackerTma
tchTtheThashTto,TasTaTmeansTtoTobtainTtheTpassword?T(SelectTallTthatTa
pply.)T-TCorrectTAnswer--ATrainbowTtable
-ATdictionaryTword
, WhichTofTtheTfollowingTattacksTdoTsecurityTprofessionalsTexposeTthem
selvesTto,TifTtheyTdoTnotTsaltTpasswordsTwithTaTrandomTvalue?T-
TCorrectTAnswer-ATrainbowTtableTattack
HowTcanTanTattackerTmakeTunauthorizedTuseTofTacquiredTuserTandTacc
ountTdetailsTfromTaTuser'sTsmartTcard?T-TCorrectTAnswer-CloneTit.
WhatTtypeTofTattackTisToccurringTwhenTaTcounterfeitTcardTreaderTisTinT
use?T-TCorrectTAnswer-Skimming
AnTattackerTdiscoveredTanTinputTvalidationTvulnerabilityTonTaTwebsite,
TcraftedTaTURLTwithTadditionalTHTMLTcode,TandTemailedTtheTlinkTtoTaTvi
ctim.TTheTvictimTunknowinglyTdefacedT(vandalized)TtheTwebTsiteTafterT
clickingTonTtheTmaliciousTURL.TNoTotherTmaliciousToperationsToccurred
ToutsideTofTtheTwebTapplication'sTrootTdirectory.TThisTscenarioTisTdescri
bingTwhichTtypeTofTattack?T-TCorrectTAnswer-Cross-siteTscriptingT(XSS)
AnTattackerTescalatedTprivilegesTtoTaTlocalTadministratorTandTusedTcod
eTrefactoringTtoTevadeTantivirusTdetection.TTheTattackerTthenTallowedT
oneTprocessTtoTattachTtoTanotherTandTforcedTtheToperatingTsystemTtoTl
oadTaTmaliciousTbinaryTpackage.TWhatTdidTtheTattackerTsuccessfullyTpe
rform?T-TCorrectTAnswer-DLLTinjection
UsingTanTopenTconnectionTtoTaTsmallTcompany'sTnetwork,TanTattackerT
submittedTarbitraryTqueriesTonTportT389TtoTtheTdomainTcontrollers.TTh