An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. Which devices can the attacker use?

Explore the EC-Council CEH Certification Test. Prepare with flashcards and questions, each with explanations and insights. Gear up for success!

Multiple Choice

An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. Which devices can the attacker use?

Explanation:
When malware is delivered through compromised websites and phishing emails, any device that can connect to and communicate over the intranet can be a target. If a device on the internal network has weak security, it can be infected and then used as part of a broader attack—either to steal data, pivot to other machines, or spread further. This means the attack isn’t limited to servers, mobile devices, or only devices with external connections; it encompasses any device that can talk to the intranet. So the best choice is that any device on the intranet that can communicate can be hacked, because the delivery method can reach and compromise devices across the internal network, not just a specific type or only externally connected ones.

When malware is delivered through compromised websites and phishing emails, any device that can connect to and communicate over the intranet can be a target. If a device on the internal network has weak security, it can be infected and then used as part of a broader attack—either to steal data, pivot to other machines, or spread further. This means the attack isn’t limited to servers, mobile devices, or only devices with external connections; it encompasses any device that can talk to the intranet.

So the best choice is that any device on the intranet that can communicate can be hacked, because the delivery method can reach and compromise devices across the internal network, not just a specific type or only externally connected ones.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy