A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could
be used to attempt to trace the identity of the users?
a. Ransomware
b. Typo squatting
c.Watering hole attack
d. Integer overflow

Respuesta :

Answer:

The answer is "Option c".

Explanation:

The strike by beach bar is a protection task, in which the attacking player attempts to make concessions a community of end-users who are recognized to visit the organization by poisoning websites. It is also known as Watering hole attack. The main purpose to use this process to contaminate the computer of a directed user and achieve network access at both the target location and other options that can be identified as follows which are incorrect:

  • In option a, It is a software type, which is used to encode the files of a target, that's why It's not right.
  • In option b, It is also known as URL hijack, which is used in Cyber squats, that's why It's wrong.
  • In option d, It is a part of the programming, which is used in arithmetic operation, that's why It's incorrect.