During a regular security scan of the network you find that several user laptops are infected with the same malware. After cross-referencing the laptop users with the reverse proxy logs you find that they all accessed a industry news website the day before. You believe your organization may have been specifically targeted for this malware. What type of attack would best describe this theory?

  • SQL injection
  • SYN Flood
  • Spoofing
  • Watering hole

CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
    • This question is filed here
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance