medium
Single Answer
0

During an incident investigation, Naomi notices that a second keyboard was plugged into a system in a public area of her company’s building. Shortly after that event, the system was infected with malware, resulting in a data breach. What should Naomi look for in her in-person investigation?

Answer Options

A

A Trojan horse download

B

A malicious USB cable or drive

C

A worm

D

None of the above

Correct Answer: B

Explanation

Malicious tools like BadUSB can make a USB cable or drive look like a keyboard when they are plugged in. Malicious thumb drives have been used by penetration testers simply by dropping them in a parking lot near their intended target. A Trojan or a worm is a possibility, but the clue involving the keyboard would point to a USB device as the first place Naomi should look.