List of questions
Related questions
Question 326 - 220-1102 discussion
A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?
A.
Keylogger
B.
Ransomware
C.
Boot sector virus
D.
Cryptomining malware
Your answer:
0 comments
Sorted by
Leave a comment first