FUNDAMENTALS OF COMPUTER

BASIC COMPUTER CONCEPTS

COMPUTER SYSTEM TYPES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How is malware distributed?
A
Email attachments
B
Zoom calls
C
Suspicious web links
D
Fake internet ads
E
Watch videos on websites
Explanation: 

Detailed explanation-1: -Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as .exe files.

Detailed explanation-2: -Malicious actors hide a small piece of code deep within a legitimate looking advertisement, which will direct the user’s machine to a malicious or compromised server. When the user’s machine successfully makes a connection to the server, an exploit kit hosted on that server executes.

Detailed explanation-3: -You can fall victim to malware by either clicking on an infected ad or even just by visiting a website that is home to a corrupted ad. This second type of malware attack, known as drive-by downloads, is especially troubling. An infected ad only has to finish loading before it will harm your computer.

Detailed explanation-4: -Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads.

There is 1 question to complete.