Question: Match the following malware with their correct descriptions - Keylogger - Virus - Trojan Horse - Rootkit - Worm - Logic Bomb - Spyware -

Match the following malware with their correct descriptions

- Keylogger

- Virus

- Trojan Horse

- Rootkit

- Worm

- Logic Bomb

- Spyware

- Ransomware

A. A software/hardware that tracks every key pressed on a keyboard.

B. A software that replicates iitself into every directory on a computer upon invasion.

C. A software that disguises itself as an innocent software while running malicious scripts in the background.

D. A software that allows the hacker to bypass administrative restrictions

E. A software that has a specific target.

F. A malware that triggers when a specific condition is met.

G. Software that collects unauthorised data by use of either cameras, microphone, or other peripherals.

H. Software that locks data files and demans a monetary payment in exchange for unlocking.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!