Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of these is the most common risk among malware accidentally installed by using compromised USB thumb drives?
USB thumb drives don't pose a risk
Logic bombs
Buffer overflows
Trojan Horses
Buffer overflows are a class of software vulnerabilities or exploits of those vulnerabilities and aren't common to the USB flash drive attack vector. Logic bombs are intentional side-effects placed in program code, triggered by some external event without command and control from the attackers, like an accounting program which erases financial records for April Fools' Day, and tend to be attributable to authorized insiders. Trojan Horses describe virtually all of the common risks to using unfamiliar or compromised USB drives, as the term refers to any threat allowed voluntarily into the perimeter by the target because it didn't appear threatening.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.