Question: Susie, a security analyst, identified abnormal activity on a office computer. The host based AV has detected no malicious software. After some hard work and
Susie, a security analyst, identified abnormal activity on a office computer. The host based AV has detected no malicious software. After some hard work and utilization of special tools, she discovered the computer is running several hidden processes. Which of the following choices best describe this activity? Ransomware Spam Backdoor Rootkit
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
