medium
Single Answer
0During an incident investigation, Naomi notices that a second keyboard was plugged into a system in a public area of her company’s building. Shortly after that event, the system was infected with malware, resulting in a data breach. What should Naomi look for in her in-person investigation?
Answer Options
A
A Trojan horse download
B
A malicious USB cable or drive
C
A worm
D
None of the above
Correct Answer: B
Explanation
Malicious tools like BadUSB can make a USB cable or drive look like a keyboard when they are plugged in. Malicious thumb drives have been used by penetration testers simply by dropping them in a parking lot near their intended target. A Trojan or a worm is a possibility, but the clue involving the keyboard would point to a USB device as the first place Naomi should look.