How does a watering-hole attack work? The attacker uses a social situation to smooth talk an individual into revealing sensitive information. O The attacker combs the organization's website for details about key employees, shared there for anyone to read. After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the web application with malware. Mingling with employees, the attacker enters a secured facility from a break room or other gathering area with an exterior door.
How does a watering-hole attack work? The attacker uses a social situation to smooth talk an individual into revealing sensitive information. O The attacker combs the organization's website for details about key employees, shared there for anyone to read. After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the web application with malware. Mingling with employees, the attacker enters a secured facility from a break room or other gathering area with an exterior door.
Related questions
Question
Do not use AI.
![How does a watering-hole attack work?
The attacker uses a social situation to smooth talk an individual into revealing sensitive information.
O The attacker combs the organization's website for details about key employees, shared there for anyone to
read.
O After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the
web application with malware.
O Mingling with employees, the attacker enters a secured facility from a break room or other gathering area
with an exterior door.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fcce98fb5-dde5-46fe-82fa-88f22baa87e0%2Ff0a570eb-77d7-4a99-9a6b-4d83c1f3cf6d%2Fwzhnhg5_processed.jpeg&w=3840&q=75)
Transcribed Image Text:How does a watering-hole attack work?
The attacker uses a social situation to smooth talk an individual into revealing sensitive information.
O The attacker combs the organization's website for details about key employees, shared there for anyone to
read.
O After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the
web application with malware.
O Mingling with employees, the attacker enters a secured facility from a break room or other gathering area
with an exterior door.
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)