A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?

a. Ransomware
b. Typo squatting
c. Watering hole attack
d. Integer overflow


Answer: c. Watering hole attack

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. Templates allow only parameterized types for functions. 2. In writing a class template, the function declarations within the class require special placement.

Computer Science & Information Technology

Which of the following tools, from Raw Logic, can be used to identify shared drives and folders on a Windows system?

A) NetCop B) NetBrute C) Nessus D) SAINT

Computer Science & Information Technology

As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Compute the average of the following list of numbers: 2, —3, 5, —7, 9.

What will be an ideal response?

Computer Science & Information Technology