COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
A desktop system on your network has been compromised. Despite loading different operating systems using different media on the same desktop, attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of what type of rootkit
|
Application
|
|
Kernel
|
|
Firmware
|
|
Virtual
|
Explanation:
Detailed explanation-1: -Zombie computers, or bots, refer to each malware-infected user device that’s been taken over for use in the botnet. These devices operate mindlessly under commands designed by the bot herder.
Detailed explanation-2: -Obfuscation: Obfuscation is a technique used to hide the true intent of code by making it difficult to understand. Obfuscation is often used to evade detection by security software.
Detailed explanation-3: -Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert.
There is 1 question to complete.