QUESTION: 86 Why would a cybercriminal avoid using a trojan in a widespread attack? A. trojans are easily caught by antivirus products B. end-users are aware of clicking on non-trusted executables C. trojans only infect one system at a time D. execution of trojans are dependent on the operating system Answer: C QUESTION: 87 A cybercriminal is trying to get a foothold into an organization by exploiting a weakness in their web servers. What is the most common website vulnerability that cybercriminals can use? A. guest user accounts B. default credentials C. open shares D. excessive directory access rights Answer: B QUESTION: 88 What is the most common method bots may use to extract data?A. SSL B. IRC C. FTP D. P2P Answer: C QUESTION: 89 An organization has a requirement to ensure they are meeting industry best practices for securing their IT environment. Which strategy is appropriate for this organization?