ExamGecko
Question list
Search
Search

Related questions











Question 532 - 312-50v12 discussion

Report
Export

Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?

A.
Instant Messenger Applications; verifying the sender's identity before opening any files
Answers
A.
Instant Messenger Applications; verifying the sender's identity before opening any files
B.
Insecure Patch Management; updating application software regularly
Answers
B.
Insecure Patch Management; updating application software regularly
C.
Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
Answers
C.
Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
D.
Portable Hardware Media/Removable Devices; disabling Autorun functionality
Answers
D.
Portable Hardware Media/Removable Devices; disabling Autorun functionality
Suggested answer: A

Explanation:

The attack scenario is best described as Instant Messenger Applications, and the measure that could have prevented it is verifying the sender's identity before opening any files. Instant Messenger Applications are communication tools that allow users to exchange text, voice, video, and file messages in real time. However, they can also be used as attack vectors for spreading malware, such as viruses, worms, or Trojans, by exploiting the trust and familiarity between the users. In this scenario, the attacker compromised one of the team member's messenger account and used it to send malicious files to the other team members, who may have opened them without suspicion, thus infecting their systems.This type of attack is also known as an instant messaging worm12.

To prevent this type of attack, the users should verify the sender's identity before opening any files sent through instant messenger applications. This can be done by checking the sender's profile, asking for confirmation, or using a secure channel.Additionally, the users should also follow other security tips, such as using strong passwords, updating the application software, scanning the files with antivirus software, and reporting any suspicious activity34.

1: Instant Messaging Worm - Techopedia

2: Cybersecurity's Silent Foe: A Comprehensive Guide to Computer Worms | Silent Quadrant

3: Instant Messenger Hacks: 10 Security Tips to Protect Yourself - MUO

4: Increased phishing attacks on instant messaging platforms: how to prevent them | Think Digital Partners

asked 18/09/2024
Chad Clark
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first