A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?

a. Ransomware
b. Typo squatting
c. Watering hole attack
d. Integer overflow

Answer: c. Watering hole attack

Computer Science & Information Technology

You might also like to view...

Tagged Image File Format is not used on Web pages

Indicate whether the statement is true or false

Computer Science & Information Technology

If the cell reference $A5 in a formula is copied and pasted over two columns and down two rows from its original cell, what the cell reference become in the new cell

A) $C5 B) $C7 C) $A7 D) $A5

Computer Science & Information Technology