Software acquired from third parties Flashcards
After an attacker has explored a network for information, the next step is to…
overcome any defences.
Which of the following are not considered “insiders”?
a) Business partners
b) Sub-contractors
c) Employees
d) Cybercriminals
Cybercriminals
Networks of attackers, identity thieves, scammers and financial fraudsters are
known as…
Cybercriminals
Which malware requires a user to transport it from one computer to another?
Virus
How do viruses differ from worms?
A computer virus is malicious code that reproduces itself on the same computer. The code inserts itself into files and modifies, corrupts or destroys the ability of the file to operate as normal.
A worm is a self-replicating malicious code that can spread across computer systems, which can modify, corrupt or delete data or information.