header bg

Scan QR code or get instant email to install app

Question:

During an incident investigation, Tracy notes that a second keyboard was plugged into a system in a public area of her company's building. Shortly after that event, the system was infected with malware, resulting in a data breach. Which of the following should Tracy look for in her in-person investigation?

A A malicious USB cable or drive.
explanation

Malicious tools like BadUSB can make a USB cable or drive look like a keyboard when they are plugged in. Somewhat strangely, the Security+ exam outline focuses on malicious USB cables, but you should be aware that malicious thumb drives are far more common and have been used by penetration testers simply by dropping them in a parking lot near their intended target. A Trojan or a worm is a possibility, but the clue involving the keyboard would point to a USB device as the first place Tracy should look.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*