CompTIA Security+ Exam Prep

Category - Operations

I am an evil hacker. I wish to infect your system with malicious code. What item below would I not do?
  1. Viruses
  2. Trojan Horses
  3. Worms
  4. Finger Jam
Explanation
Answer: D - Malicious code does not include finger jam. Malicious software code creates such things as viruses, Trojan horses, worms, and logic bombs. They usually are dormant until activated by an event the user or system initiates. They can be spread by e-mail, sharing media, sharing documents and programs, or downloading things from the Internet, or they can be purposely inserted by an attacker. Malware usually has one or more elements: insertion, avoidance, eradication, replication, trigger, and payload.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz