a. What are payloads? 8a.) Pieces of code that are executed after the virus or worm has

Question:

a. What are payloads?

8a.) Pieces of code that are executed after the virus or worm has spread are called _______.

a. Vulnerabilities

b. Exploits

c. Compromises

d. Payloads


a. What is ransomware?

8b.) In a _______ attack, the attacker encrypts some or all of the victim’s hard drive.

a. Virus

b. DoS

c. Ransom

d. Lock


c. What is spyware?

8c.) The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is _______.

a. Keystroke logger

b. Anti-privacy software

c. Spyware

d. Data mining software


d. What is the difference between the two types of spyware mentioned in the text?

8d.) A program that can capture passwords as you enter them is _______.

a. A keystroke logger

b. Data mining software

c. Both A and B

d. Neither A nor B


e. Distinguish between credit card number theft and identity theft.

8e.) In which type of attack does the attacker gather extensive sensitive personal information about its victim?

a. Identity theft

b. Credit card number theft

c. Both A and B

d. Neither A nor B


f. Which is more harmful to the victim? Why?

8f.) Which is more harmful to the victim?

a. Identity theft

b. Credit card number theft

c. Both A and B are about equally harmful

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: