Question: Match the following malware with their correct descriptions - Keylogger - Virus - Trojan Horse - Rootkit - Worm - Logic Bomb - Spyware -
Match the following malware with their correct descriptions
- Keylogger
- Virus
- Trojan Horse
- Rootkit
- Worm
- Logic Bomb
- Spyware
- Ransomware
A. A software/hardware that tracks every key pressed on a keyboard.
B. A software that replicates iitself into every directory on a computer upon invasion.
C. A software that disguises itself as an innocent software while running malicious scripts in the background.
D. A software that allows the hacker to bypass administrative restrictions
E. A software that has a specific target.
F. A malware that triggers when a specific condition is met.
G. Software that collects unauthorised data by use of either cameras, microphone, or other peripherals.
H. Software that locks data files and demans a monetary payment in exchange for unlocking.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
