Through process of elimination alone it's A.
If you end up getting stuck on a CompTIA test remember this:
- A completely wrong answer
- A correct answer
- A CompTIA correct answer (the one you want)
- An answer that sounds good because you didn't study
A watering hole attack attempts to discover which websites a group of
people are likely to visit and then infects those websites with malware that
can infect the visitors. The attacker’s goal is to infect a website that users
trust already, making them more likely to download infected files.
A watering hole attack is a targeted cyber attack aimed at compromising users within a specific industry or group. In this type of attack, the attacker identifies websites or online resources that are frequently visited by the target group (similar to animals gathering at a watering hole in the wild) and injects malicious code into those websites. When the targeted users visit the compromised websites, their devices may become infected with malware, allowing the attackers to gain unauthorized access to the users' systems or steal sensitive information. Watering hole attacks are particularly effective against targeted groups, as they rely on the trust users place in the legitimate websites they visit.
A. A watering hole attack is a targeted attack aimed at compromising users within a specific industry or group. In this type of attack, the attacker identifies a website that is frequently visited by the target group and infects it with malware. When a member of the target group visits the site, their computer becomes infected, and the attacker gains access to their system. This type of attack is often used in espionage or advanced persistent threat (APT) attacks. Typosquatting (option B) is a type of attack where an attacker creates a domain name that is very similar to a legitimate domain name in the hope that users will mistype the legitimate name and end up on the attacker's site. A hoax (option C) is a false or misleading message that is spread with the intent to deceive or trick people. Impersonation (option D) is when an attacker pretends to be someone else in order to gain access to sensitive information or to carry out fraudulent activities.
A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Gino_Slim
Highly Voted 2 years, 8 months agogladtam
2 years, 3 months agopalito1980
2 years, 1 month ago[Removed]
Highly Voted 2 years, 8 months agoLordJaraxxus
Most Recent 1 year, 3 months agogton12
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agoYawannawanka
2 years, 2 months agopassmemo
2 years, 8 months agoserginljr
2 years, 8 months ago