An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information.What kind of exploit has been used in this scenario? (Select two. Both responses are different names for the same exploit.)- DNS poisoning- Pharming- Man-in-the-middle- Domain name kiting- Reconnaissance
  • - DNS poisoning- Pharming
  • DDos
  • DNS poisoning
  • Spam
You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to updates those files every day.What else should you do to protect your systems from malware? (Select two.)- Disable UAC.- Educate users about malware.- Enable chassis intrusion detection.- Enable account lockout.- Schedule regular full system scans.
  • Configure the software to automatically download the virus definition files as soon as they become available.
  • - DNS poisoning- Pharming
  • It has been moved to a secure folder on your computer.
  • - Educate users about malware.- Schedule regular full system scans.
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0