Software acquired from third parties Flashcards

1
Q

After an attacker has explored a network for information, the next step is to…

A

overcome any defences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are not considered “insiders”?

a) Business partners
b) Sub-contractors
c) Employees
d) Cybercriminals

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Networks of attackers, identity thieves, scammers and financial fraudsters are
known as…

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which malware requires a user to transport it from one computer to another?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do viruses differ from worms?

A

A computer virus is malicious code that reproduces itself on the same computer. The code inserts itself into files and modifies, corrupts or destroys the ability of the file to operate as normal.

A worm is a self-replicating malicious code that can spread across computer systems, which can modify, corrupt or delete data or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly