Question: During a recent security breach at STU Corporation, attackers successfully infiltrated the network using two distinct strategies. First, they tricked employees into downloading a seemingly

During a recent security breach at STU Corporation, attackers successfully infiltrated the network using two distinct strategies. First, they tricked employees into downloading a seemingly legitimate software update that actually contained a virus. They also called employees posing as IT support staff to acquire their login credentials. Which two cyberattack techniques best describe the attackers methods?
Phishing and malware.
Ransomware and denial of service (DoS).
Malware and social engineering.
Distributed denial of service (DDoS) and spear phishing.
Phishing and malware.
Ransomware and denial of service (DoS).
Malware and social engineering.
Distributed denial of service (DDoS) and spear phishing.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!