A security consultant is analyzing data from a recent compromise.
The following data points are documented
• Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user.
• The data was unreadable by any known commercial software.
• The issue spread through the enterprise via SMB only when certain users accessed data.
• Removal instructions were not available from any major antivirus vendor.
Which of the following types of malware is this example of?
A . RAT
B . Ransomware
C . Backdoor
D . Keylogger
E . Worm
Answer: A
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund