A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?

A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?



a. Typo squatting
b. Integer overflow
c. Watering hole attack
d. Ransomware




Answer: C


Learn More :

Network Security

Learn More Multiple Choice Question :