ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 548 - SY0-601 discussion

Report
Export

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge.

Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

A.
A bol
Answers
A.
A bol
B.
A fileless virus
Answers
B.
A fileless virus
C.
A logic bomb
Answers
C.
A logic bomb
D.
A RAT
Answers
D.
A RAT
Suggested answer: D

Explanation:

A RAT (Remote Access Trojan) is a type of malware that allows an attacker to remotely access and control a compromised system without the user's knowledge or consent. A RAT can perform various malicious activities on the system, such as stealing data, installing other malware, deleting files, modifying settings, capturing keystrokes, recording audio or video, etc. In this case, the attacker most likely used a RAT to gain administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge

asked 02/10/2024
Aurelio Chavez
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first