COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Malicious code that secretly watches your computer activity and sends the information over the Internet; can secretly capture your keystrokes (including passwords) and compromise your identity
A
spyware
B
virus
C
worms
D
phishing
Explanation: 

Detailed explanation-1: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-2: -Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.

Detailed explanation-3: -A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic.

Detailed explanation-4: -Ransomware, spyware and Trojans are examples of malware. Depending on the type of malicious code, malware could be used by hackers to steal or secretly copy sensitive data, block access to files, disrupt system operations or make systems inoperable.

Detailed explanation-5: -The malicious network of infected devices under a C2 server’s control is called a botnet. Traditional botnets are formed by compromising a device with a Trojan Horse that installs and uses Internet Relay Chat (IRC) to communicate with the C2 server.

There is 1 question to complete.