a. What are payloads? 8a.) Pieces of code that are executed after the virus or worm has
Question:
a. What are payloads?
8a.) Pieces of code that are executed after the virus or worm has spread are called _______.
a. Vulnerabilities
b. Exploits
c. Compromises
d. Payloads
a. What is ransomware?
8b.) In a _______ attack, the attacker encrypts some or all of the victim’s hard drive.
a. Virus
b. DoS
c. Ransom
d. Lock
c. What is spyware?
8c.) The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is _______.
a. Keystroke logger
b. Anti-privacy software
c. Spyware
d. Data mining software
d. What is the difference between the two types of spyware mentioned in the text?
8d.) A program that can capture passwords as you enter them is _______.
a. A keystroke logger
b. Data mining software
c. Both A and B
d. Neither A nor B
e. Distinguish between credit card number theft and identity theft.
8e.) In which type of attack does the attacker gather extensive sensitive personal information about its victim?
a. Identity theft
b. Credit card number theft
c. Both A and B
d. Neither A nor B
f. Which is more harmful to the victim? Why?
8f.) Which is more harmful to the victim?
a. Identity theft
b. Credit card number theft
c. Both A and B are about equally harmful
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko