Question: a. What are payloads? 8a.) Pieces of code that are executed after the virus or worm has spread are called _______. a. Vulnerabilities b. Exploits

a. What are payloads?

8a.) Pieces of code that are executed after the virus or worm has spread are called _______.

a. Vulnerabilities

b. Exploits

c. Compromises

d. Payloads


a. What is ransomware?

8b.) In a _______ attack, the attacker encrypts some or all of the victim’s hard drive.

a. Virus

b. DoS

c. Ransom

d. Lock


c. What is spyware?

8c.) The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is _______.

a. Keystroke logger

b. Anti-privacy software

c. Spyware

d. Data mining software


d. What is the difference between the two types of spyware mentioned in the text?

8d.) A program that can capture passwords as you enter them is _______.

a. A keystroke logger

b. Data mining software

c. Both A and B

d. Neither A nor B


e. Distinguish between credit card number theft and identity theft.

8e.) In which type of attack does the attacker gather extensive sensitive personal information about its victim?

a. Identity theft

b. Credit card number theft

c. Both A and B

d. Neither A nor B


f. Which is more harmful to the victim? Why?

8f.) Which is more harmful to the victim?

a. Identity theft

b. Credit card number theft

c. Both A and B are about equally harmful

Step by Step Solution

3.20 Rating (161 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Payloads are pieces of code that malware executes to do damage 8a D Payloads b Ransomware encrypts ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!