List of questions
Related questions
Question 636 - 312-49v10 discussion
A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?
A.
Fileless
B.
Trojan
C.
JavaScript
D.
Spyware
Your answer:
0 comments
Sorted by
Leave a comment first