Multiple Choice
Match the malware with the appropriate definition.
-Trojan horse
A) Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
B) A relatively small program that infects other application software by attaching to it and disrupting application function
C) Tiny piece(s) of programming code that install themselves on the infected computer called a Zombie
D) Similar to a virus except it does not need a host application to function or reproduce
E) Software executes when a specified event happens within the computer
Correct Answer:

Verified
Correct Answer:
Verified
Q58: The Internet is a collection of many
Q59: The physical and environmental security domain addresses<br>A)Activities
Q60: Match the malware with the appropriate definition.<br>-Viruses<br>A)Code
Q61: _ are crimes connected to information assets
Q62: _ is a piece of computer hardware
Q64: Which of the following is NOT considered
Q65: Personal data, such as home address and
Q66: Encryption is a method of converting plain
Q67: Match the malware with the appropriate definition.<br>-Worms<br>A)Code
Q68: Which of the following is NOT part