The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection. Which of the following has happened on the workstation?

A. Zero-day attack
B. Known malware infection
C. Session hijacking
D. Cookie stealing


Answer: A. Zero-day attack

Computer Science & Information Technology

You might also like to view...

To accommodate HD format video, new monitors have an aspect ratio of ________

A) 25:16 B) 5:4 C) 16:9 D) 4:3

Computer Science & Information Technology

COGNITIVE ASSESSMENT What does the S in SQL stand for?

A. Server B. System C. Structured D. Serial

Computer Science & Information Technology

When converting from prefix to postfix, we begin parsing at the left and work right until we isolate one binary expression.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To complete a LEFT OUTER JOIN, what keyword is optional?

a. LEFT b. OUTER c. JOIN d. All of these keywords are required. e. All of these keywords are optional.

Computer Science & Information Technology