Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

IT Questions BankWhich malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

Question:
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

  • virus
  • worm
  • Trojan horse
  • social engineering

Explanation: A worm is a computer program that is self replicated with the intention of attacking a system and trying to exploit a specific vulnerability in the target. Both virus and Trojan horse rely on a delivery mechanism to carry them from one host to another. Social engineering is not a type of malicious code attack.

Exam with this question: 16.5.4 Module Quiz – Network Security Fundamentals Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments