The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection. Which of the following has happened on the workstation?
A. Zero-day attack
B. Known malware infection
C. Session hijacking
D. Cookie stealing
Answer: A. Zero-day attack
Computer Science & Information Technology
You might also like to view...
To accommodate HD format video, new monitors have an aspect ratio of ________
A) 25:16 B) 5:4 C) 16:9 D) 4:3
Computer Science & Information Technology
COGNITIVE ASSESSMENT What does the S in SQL stand for?
A. Server B. System C. Structured D. Serial
Computer Science & Information Technology
When converting from prefix to postfix, we begin parsing at the left and work right until we isolate one binary expression.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To complete a LEFT OUTER JOIN, what keyword is optional?
a. LEFT b. OUTER c. JOIN d. All of these keywords are required. e. All of these keywords are optional.
Computer Science & Information Technology