A company's file server shows normal operation during business hours. However, every Friday at 5:00 PM, critical database files are automatically encrypted, and a ransom message appears. Analysis reveals that no network intrusion occurred, and the malicious code was embedded within legitimate software installed months ago.
This attack pattern MOST accurately represents:
Polymorphic virus infection
Zero-day worm exploitation
Advanced persistent threat (APT)
Logic bomb with ransomware payload
Boost your performance with adaptive practice tests
Practice every concept in the syllabus
Compare your speed and accuracy with your peers
Download the app and practice on the go