It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
A. Power resources D. Computing resources Explanation: Cryptocurrency mining requires significant computing power and consumes a large amount of electricity (power resources). Attackers who install unauthorized cryptocurrency mining software (also known as cryptojacking) are typically exploiting the system's computing resources (CPU/GPU) and consuming power resources to mine cryptocurrencies, potentially impacting the performance and efficiency of legitimate services. Why the other options are incorrect: B. Network resources: While some network resources might be used, cryptocurrency mining primarily targets computing and power resources rather than network bandwidth. C. Disk resources: Cryptocurrency mining generally does not heavily rely on disk space. It's more about processing power and energy consumption. E. Financial resources: The attack indirectly targets financial resources by increasing power consumption, but the attack itself directly exploits computing and power resources.