Question: QUESTION 6 The general term for evil software is ________. virus worm malware All of these 0.75 points QUESTION 7 In a ________ attack, the

QUESTION 6

The general term for evil software is ________.

virus

worm

malware

All of these

0.75 points

QUESTION 7

In a ________ attack, the attacker encrypts some or all of the victim's hard drive.

DoS

ransom

lock

virus

0.75 points

QUESTION 8

Which of the following attach themselves to other programs?

viruses

worms

both viruses and worms

neither viruses nor worms

0.75 points

QUESTION 9

A debit card is secure because it requires two credentials for authenticationthe card itself and a PIN. This is called ________.

segmentation

redundancy

two-factor authentication

None of these

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!