A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file download from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker MOST likely use to gain access?
A) A bot
B) A fileless virus
C) A logic bomb
D) A RAT
Correct Answer:
Verified
Q513: A forensics investigator is examining a number
Q514: Which of the following BEST explains the
Q515: A cryptographer has developed a new proprietary
Q516: A security administrator suspects there may be
Q517: During a forensic investigation, which of the
Q519: A systems administrator is installing and configuring
Q520: A government agency with sensitive information wants
Q521: Which of the following scenarios would make
Q522: An organization has decided to host its
Q523: A network administrator was concerned during an
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents