COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which will deploy when conditions exist that the malware is seeking?
A
Armored virus
B
Time bomb
C
Trojan horse
D
Logic bomb
Explanation: 

Detailed explanation-1: -A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

Detailed explanation-2: -Threat actors can exploit any vulnerability in the software to inject malware into update packages, which are deployed when the user downloads or updates the software. Anti-malware, EDR, and SIEM solutions can aid in the detection of suspicious downloads and malware deployments.

Detailed explanation-3: -In the weaponization stage, all of the attacker’s preparatory work culminates in the creation of malware to be used against an identified target.

Detailed explanation-4: -Firstly, it is important to periodically scan all files. Secondly, it is very important to keep your anti-virus software updated regularly. Avoid pirated software. Train employees on spotting phishing emails. Never trust unsecured web links.

There is 1 question to complete.