List of questions
Related questions
Question 560 - 312-50v12 discussion
An IT security team is conducting an internal review of security protocols in their organization to identify potential vulnerabilities. During their investigation, they encounter a suspicious program running on several computers. Further examination reveals that the program has been logging all user keystrokes. How can the security team confirm the type of program and what countermeasures should be taken to ensure the same attack does not occur in the future?
A.
The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall
B.
The program is spyware; the team should use password managers and encrypt sensitive data
C.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software
D.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups
Your answer:
0 comments
Sorted by
Leave a comment first