COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Armored virus
|
|
Time bomb
|
|
Trojan horse
|
|
Logic bomb
|
Detailed explanation-1: -A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.
Detailed explanation-2: -Threat actors can exploit any vulnerability in the software to inject malware into update packages, which are deployed when the user downloads or updates the software. Anti-malware, EDR, and SIEM solutions can aid in the detection of suspicious downloads and malware deployments.
Detailed explanation-3: -In the weaponization stage, all of the attacker’s preparatory work culminates in the creation of malware to be used against an identified target.
Detailed explanation-4: -Firstly, it is important to periodically scan all files. Secondly, it is very important to keep your anti-virus software updated regularly. Avoid pirated software. Train employees on spotting phishing emails. Never trust unsecured web links.