Employees in an organization report that the network access is slow. Further investigation reveals that one employee downloaded a third-party scanning program for the printer. What type of malware may have been introduced?
- Phishing
- Worm
- Spam
- Trojan horse
Explanation: Worms are malicious code that replicates by independently exploiting vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms can run by themselves. Other than the initial infection, worms no longer require user participation. After a worm affects a host, it is able to spread very quickly over the network. Worms share similar patterns. They all have an enabling vulnerability, a way to propagate themselves, and they all contain a payload.
Exam with this question: Cybersecurity Essentials Module 1 Quiz Answers
Exam with this question: Network Support and Security 2.6.3 Cybersecurity Threats, Vulnerabilities, and Attacks Quiz
Exam with this question: 1.6.2 Cybersecurity Threats, Vulnerabilities, and Attacks Quiz
Exam with this question: Network Support and Security: My Knowledge Check Answers
Exam with this question: Endpoint Security: My Knowledge Check Answers
Please login or Register to submit your answer