ExamGecko
Question list
Search
Search

Related questions











Question 560 - 312-50v12 discussion

Report
Export

An IT security team is conducting an internal review of security protocols in their organization to identify potential vulnerabilities. During their investigation, they encounter a suspicious program running on several computers. Further examination reveals that the program has been logging all user keystrokes. How can the security team confirm the type of program and what countermeasures should be taken to ensure the same attack does not occur in the future?

A.
The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall
Answers
A.
The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall
B.
The program is spyware; the team should use password managers and encrypt sensitive data
Answers
B.
The program is spyware; the team should use password managers and encrypt sensitive data
C.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software
Answers
C.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software
D.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups
Answers
D.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups
Suggested answer: C

Explanation:

A keylogger is a type of spyware that can record and steal consecutive keystrokes (and much more) that the user enters on a device. Keyloggers are a common tool for cybercriminals, who use them to capture passwords, credit card numbers, personal information, and other sensitive data. Keyloggers can be installed on a device through various methods, such as phishing emails, malicious downloads, or physical access. To confirm the type of program, the security team can use a web search tool, such as Bing, to look for keylogger programs and compare their features and behaviors with the suspicious program they encountered. Alternatively, they can use a malware analysis tool, such as Malwarebytes, to scan and identify the program and its characteristics.

To prevent the same attack from occurring in the future, the security team should employ intrusion detection systems (IDS) and regularly update the system software. An IDS is a system that monitors network traffic and system activities for signs of malicious or unauthorized behavior, such as keylogger installation or communication. An IDS can alert the security team of any potential threats and help them respond accordingly. Regularly updating the system software can help patch any vulnerabilities or bugs that keyloggers may exploit to infect the device. Additionally, the security team should also remove the keylogger program from the affected computers and change any compromised passwords or credentials.Reference:

Keylogger | What is a Keylogger? How to protect yourself

How to Detect and Remove a Keylogger From Your Computer

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

What is a Keylogger? | Keystroke Logging Definition | Avast

Keylogger Software: 11 Best Free to Use in 2023

asked 18/09/2024
Pablo Fernandez Rada
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first