subject

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B. loggerware C. attackware D. malware
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D. worms, system kits, and loggerware
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C. robots D.
phishing
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D. updated software
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 01:30
How will you cite information that is common knowledge in your research paper?
Answers: 1
question
Computers and Technology, 22.06.2019 03:30
Identify at least three types of characteristics that you were asked about as you the computer identify a fruit.
Answers: 3
question
Computers and Technology, 22.06.2019 09:00
Which best describes the condition under which the unicode output is the same as plain text?
Answers: 3
question
Computers and Technology, 22.06.2019 20:00
Need asap write a short paper describing the history and differences between six sigma, waterfall, agile, and scrum models. understanding these models can give you a good idea of how diverse and interesting it development projects can be. describe what the rationale for them is and describe their key features. describe the history behind their development. at least 400 words
Answers: 1
You know the right answer?
1. Software that is designed to intentionally cause harm to a device, server, or network is A. outwa...
Questions
question
Mathematics, 18.09.2019 00:30
question
World Languages, 18.09.2019 00:30
Questions on the website: 13722359