A. file-less attack
B. living off the land
C. script kiddies
D. opportunistic attack
A. Weekly
B. Threat Distribution
C. Device Integrity
D. Comprehensive
A. Sapient
B. Reputation
C. Emulator
D. ITCS
A. https://spocsymantec.com/livetri.zip
B. https://update.symantec.com/livetri.zip
C. http://update.symantec.com/livetri.zip
D. https://liveupdate.symantec,com/livetri.zi
A. Privilege Escalation
B. Command and Control
C. Lateral Movement
D. Credential Access
A. SHA2
B. SHA256
C. MD5 "Salted"
D. SHA256 "salted"
A. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
B. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
C. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
D. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor