Which of the following forms of malware are typically s…

Which of the following forms of malware are typically standalone software that appear to be legitimate
applications? (Select the best answer.)

Which of the following forms of malware are typically standalone software that appear to be legitimate
applications? (Select the best answer.)

A.
bots

B.
Trojan horses

C.
viruses

D.
worms

Explanation:
Of the available choices, Trojan horses are the forms of malware that are typically standalone software that
appear to be legitimate applications. Malware, which is a term formed from the combination of the words
malicious and software, is unwanted software that is specifically designed to be malicious. Malware can
damage or disrupt systems, steal information from a user, or perform other unwanted and malicious actions.
Trojan horses can be used to annoy users, steal information, destroy data, or install back doors.
Bots are forms of malware but are not typically standalone software that appear to be legitimate applications. A
bot is a type of automated software that can be used as a remote command and control tool to exploit a
compromised system for malicious purposes. For example, a botnet is a network of bots on compromised
systems that can be used to carry out coordinated attacks, such as a Distributed Denial of Service (DDoS)
attack.
Viruses are forms of malware but are not typically standalone software that appear to be legitimate applications.
A virus is a type of software that can make copies of itself and inject them into other software. Viruses can
therefore spread across systems and networks. The level of damage that can be inflicted by viruses ranges
from annoyances to destruction of data.
Worms are forms of malware but are not typically standalone software that appear to be legitimate applications.
Similar to a virus, a worm is a type of software that can make copies of itself and propagate across a network.
However, a worm is typically standalone software that does not require human interaction in order to propagate.

Cisco: What Is the Difference: Viruses, Worms, Trojans, and Bots?



Leave a Reply 0

Your email address will not be published. Required fields are marked *