A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not find any attempted logins. The analyst then runs the diff command, comparing the C:\Windows\System32 directory and the installed cache directory. The analyst finds a series of files that look suspicious. One of the files contains the following commands:
Which of the following types of malware was used?
A) Worm
B) Spyware
C) Logic bomb
D) Backdoor
Correct Answer:
Verified
Q855: A water utility company has seen a
Q856: A security, who is analyzing the security
Q857: A user needs to transmit confidential information
Q858: Which of the following control types would
Q859: A security analyst identified an SQL injection
Q861: A security analyst is emailing PII in
Q862: A security administrator is investigating a possible
Q863: A security administrator needs to conduct a
Q864: Which of the following BEST describes the
Q865: A penetration tester is checking to see
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents