COMPLETE SOLUTIONS GRADED A++ LATEST UPDATE
An employee calls IT personnel and states that they received an email with a PDF
document to review. After the PDF was opened, the system has not been
performing correctly. An IT admin conducted a scan and found a virus. Determine
the two classes of viruses the computer most likely has. (Select all that apply.)
-Script
-Program
Which of the following depict ways a malicious attacker can gain access to a
target's network? (Select all that apply.)
-Shoulder surfing
-Phishing
Before leaving for lunch, an employee receives a phone call, but there is no one
on the line. Distracted by the odd interruption, the employee forgets to log out of
the computer. Earlier that day, a person from the building across the street
watched the employee entering login credentials using high-powered binoculars.
Which form of social engineering is being used in this situation?
Shoulder surfing
A gaming company decides to add software on each title it releases. The
company's objective is to require the CD to be inserted during use. This software
will gain administrative rights, change system files, and hide from detection