A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
r, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior? Crpto-malware
Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.
Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.
How can you protect against phishing and spoofing scams?
Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer.