Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
During enumeration, a red team discovered that an external web server was frequented by employees. After compromising the server, which of the following attacks would BEST support compromising company systems?
C. A watering-hole attack
A watering-hole attack involves compromising a website that is frequently visited by the target individuals. In this scenario, the red team has already discovered that an external web server is frequented by employees. By compromising this server and using it as a watering hole, attackers can exploit the trust employees have in the website to deliver malicious content or conduct further attacks. This type of attack is particularly effective when employees visit the compromised site, unaware that it has been tampered with, making it a suitable choice for compromising company systems in this context.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Mordor
Highly Voted 6 months agoER1
Most Recent 1 week, 5 days ago041ba31
2 months, 1 week ago