A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?
a. Ransomware
b. Typo squatting
c. Watering hole attack
d. Integer overflow
Answer: c. Watering hole attack
Computer Science & Information Technology
You might also like to view...
Tagged Image File Format is not used on Web pages
Indicate whether the statement is true or false
Computer Science & Information Technology
If the cell reference $A5 in a formula is copied and pasted over two columns and down two rows from its original cell, what the cell reference become in the new cell
A) $C5 B) $C7 C) $A7 D) $A5
Computer Science & Information Technology