Q: 6
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is
up-to-date on all relevant patches and updates. The installed antivirus software has not identified
any malicious code. During the investigation, the worker discovers that an attacker compromised the
system, even though the worker did not engage in any behavior that could have introduced a virus or
other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 6 of 15