Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

A. Logic bomb
B. Worm
C. Trojan
D. Adware


Answer: C. Trojan

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The connection-oriented integrity service addresses both message stream modification and denial of service. 2. All the techniques for providing security have two components: a security-related transformation on the information to be sent and some secret information shared by the two principals. 3. An attack tree is a branching hierarchical data structure represents a set of potential techniques for exploiting security vulnerabilities. 4. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts. 5. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.

Computer Science & Information Technology

________ acts as a cell phone with a card reader built into it; it will allow you to make secure purchases anywhere.

(a) eConnect. (b) eCashPad. (c) ePocketPay. (d) Visa Cash.

Computer Science & Information Technology

Describe adware.

What will be an ideal response?

Computer Science & Information Technology

What value would be returned by the call to method cList.insert(9, sip)?

Given cList: bip, snip, pip, rip, dip, clip. a. true b. false c. it throws an exception d. sip

Computer Science & Information Technology