NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Do not need to attach to a program
|
|
Need to attach to a program
|
|
A type of social engineering
|
|
Designed to access a computer by misleading users of its’ intent by prompting to download a program
|
Detailed explanation-1: -A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes on the network. It may do this without any user intervention. Unlike a computer virus, a computer worm does not need to attach itself to an existing program.
Detailed explanation-2: -A Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another. Trojans often are disguised as useful software.
Detailed explanation-3: -A worm is a type of malware that can copy itself and often spreads through a network by exploiting security vulnerabilities. It can spread through email attachments, text messages, file-sharing programs, social networking sites, network shares, removable drives, and software vulnerabilities.