A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?
a. Ransomware
b. Typo squatting
c. Watering hole attack
d. Integer overflow
Answer: c. Watering hole attack
You might also like to view...
Answer the following questions true (T) or false (F)
1. Templates allow only parameterized types for functions. 2. In writing a class template, the function declarations within the class require special placement.
Which of the following tools, from Raw Logic, can be used to identify shared drives and folders on a Windows system?
A) NetCop B) NetBrute C) Nessus D) SAINT
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
Answer the following statement true (T) or false (F)
Compute the average of the following list of numbers: 2, —3, 5, —7, 9.
What will be an ideal response?