Question: During a recent security breach at STU Corporation, attackers successfully infiltrated the network using two distinct strategies. First, they tricked employees into downloading a seemingly
During a recent security breach at STU Corporation, attackers successfully infiltrated the network using two distinct strategies. First, they tricked employees into downloading a seemingly legitimate software update that actually contained a virus. They also called employees posing as IT support staff to acquire their login credentials. Which two cyberattack techniques best describe the attackers methods?
Phishing and malware.
Ransomware and denial of service DoS
Malware and social engineering.
Distributed denial of service DDoS and spear phishing.
Phishing and malware.
Ransomware and denial of service DoS
Malware and social engineering.
Distributed denial of service DDoS and spear phishing.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
