Ethical Hacking > QUESTIONS & ANSWERS > Certified Ethical Hacker -WGU C701 Already Passed (All)
Certified Ethical Hacker -WGU C701 Already Passed Black hat Search Engine Optimization (SEO) ✔✔uses aggressive SEO tactics such as keyword stuffing, inserting doorway pages, page swapping, and ... adding unrelated keywords to get higher search engine rankings for malware pages. Social Engineered Click-jacking ✔✔Attackers inject malware into websites that appear legitimate to trick users into clicking them. When clicked, the malware embedded in the link executes without the knowledge or consent of the user. Spear-phishing Sites ✔✔This technique is used for mimicking legitimate institutions, such as banks, to steal passwords, credit card and bank account data, and other sensitive information. Malvertising ✔✔This technique involves embedding malware-laden advertisements in legitimate online advertising channels to spread malware on systems of unsuspecting users. Compromised Legitimate Websites ✔✔Often, attackers use compromised websites to infect systems with malware. When an unsuspecting user visits the compromised website, he/she unknowingly installs the malware on his/her system, after which the malware performs malicious activities. Drive-by Downloads ✔✔This refers to the unintentional downloading of software via the Internet. Here, an attacker exploits flaws in browser software to install malware by merely visiting a website. Spam Emails ✔✔The attacker attaches a malicious file to an email and sends the email to multiple target addresses. The victim is tricked into clicking the attachment and thus executes the malware, thereby compromising his/her machine. This technique is the most common method currently in use by attackers. In addition to email attachments, an attacker may also use the email body to embed the malware. Crypter ✔✔It is a software program that can conceal the existence of malware. Attackers use this software to elude antivirus detection. It protects malware from reverse engineering or analysis, thus making it difficult to detect by security mechanisms. Downloader ✔✔It is a type of Trojan that downloads other malware (or) malicious code and files from the Internet to a PC or device. Usually, attackers install a downloader when they first gain access to a system. Dropper ✔✔It is a covert carrier of malware. Attackers embed notorious malware files inside droppers, which can perform the installation task covertly. Attackers need to first install the malware program or code on the system to execute the dropper. The dropper can transport malware code and execute malware on a target system w [Show More]
Last updated: 2 years ago
Preview 1 out of 33 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU Master's Course C701 Bundled Exams with Verified Solutions
By Nutmegs 2 years ago
$15
5
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
May 21, 2023
Number of pages
33
Written in
All
This document has been written for:
Uploaded
May 21, 2023
Downloads
0
Views
224
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·