GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 128


A fake installer exploit is delivered using which attack?

Show Answer
Correct Answer: C

A fake installer exploit is often delivered using a watering hole attack. In this type of attack, the attacker identifies websites that are frequently visited by the targeted individuals and injects malicious software into them. When the targets visit these compromised sites, the malicious software, such as a fake installer, is delivered to their systems.

Discussion

1 comment
Sign in to comment
RezaeeOption: C
Jan 31, 2024

C. Watering hole