Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Ransomware takes control of the victim computer, alters something on it, then asks for a ransom to reverse the alteration. Which is NOT a valid ransomware control?
Encrypt data with a secret key.
Overwrite the data with cryptographic hashes.
Change the user's password.
Scramble the file allocation table using a secret algorithm.
Overwriting the data with cryptographic hashes is a destructive action and the victim does not have any reason or hope to get back the data if the ransom is paid. I DISAGREE - THERE IS NOTHING SCIENTIFIC TO PROVE THAT EXPLANATION
Also - if the ransomware changes the user's password, how would the user be able to logon to even see the ransomware message..?
Poorly written question
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.