FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Logic/Time Bombs malware
A
were designed to lie dormant until a specific logical condition is met
B
tracks users’ keystrokes, obtains passwords, and other personal information
C
is an entry point into a program without it knowing
D
go KABOOM
Explanation: 

Detailed explanation-1: -A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

Detailed explanation-2: -A logic bomb is a piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious.

Detailed explanation-3: -A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.

Detailed explanation-4: -If the trigger is related to a date or time, the logic bomb will go off on a certain date–e.g., Y2K–and is known as a time bomb. Its payload refers to the specific component that’s programmed to cause damage, such as deleting files, sending spam emails and stealing data.

Detailed explanation-5: -Ransomware can remain dormant on a device until the device is at its most vulnerable, and only then execute an attack.

There is 1 question to complete.