MULTIMEDIA AND QUALITY OF SERVICE
MULTIMEDIA DATA
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Extensions can not be disabled or uninstalled once they have been downloaded
|
|
There are no security risks that come with downloading extensions
|
|
All extensions contain malware
|
|
Extensions can disguise themselves as legitimate programs while actually acting as malware
|
Detailed explanation-1: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in phishing emails.
Detailed explanation-2: -A rootkit is software used by cybercriminals to gain control over a target computer or network. Rootkits can sometimes appear as a single piece of software but are often made up of a collection of tools that allow hackers administrator-level control over the target device.
Detailed explanation-3: -adware. a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Detailed explanation-4: -Bot-From the word robot, a bot is malware designed to automatically perform action, usually online. While most bots are harmless, one increasing use of malicious bots are botnets. Several computers are infected with bots which are programmed to quietly wait for commands provided by the attacker.