Which option correctly pairs a malware type with its defining characteristic?

Prepare for the Cybercrime Test with comprehensive coverage of real-world scenarios, various security domains, and expert techniques. Enhance your knowledge with flashcards and extensive question explanations. Ace your exam confidently!

Multiple Choice

Which option correctly pairs a malware type with its defining characteristic?

Explanation:
Understanding malware types focuses on how they spread and what they do to files. A virus is defined by self-replication by attaching to host files; it hides inside legitimate files and makes copies when those infected files are opened or executed, allowing the malware to spread as users run content they think is harmless. Worms self-propagate across networks, often exploiting vulnerabilities to spread without user action, which is why the claim about self-replication and file attachment doesn’t describe a worm. Ransomware centers on encrypting a victim’s data and demanding payment for the decryption key, not on self-spreading by attaching to files. Trojans disguise themselves as legitimate software or files but don’t replicate themselves by attaching to other files. They rely on user interaction to unlock their harmful payload. So the pairing Virus with self-replication by attaching to files best matches the defining behavior of that malware type.

Understanding malware types focuses on how they spread and what they do to files. A virus is defined by self-replication by attaching to host files; it hides inside legitimate files and makes copies when those infected files are opened or executed, allowing the malware to spread as users run content they think is harmless.

Worms self-propagate across networks, often exploiting vulnerabilities to spread without user action, which is why the claim about self-replication and file attachment doesn’t describe a worm.

Ransomware centers on encrypting a victim’s data and demanding payment for the decryption key, not on self-spreading by attaching to files.

Trojans disguise themselves as legitimate software or files but don’t replicate themselves by attaching to other files. They rely on user interaction to unlock their harmful payload.

So the pairing Virus with self-replication by attaching to files best matches the defining behavior of that malware type.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy