College

Match the following malware with their correct descriptions:

- Keylogger
- Virus
- Trojan Horse
- Rootkit
- Worm
- Logic Bomb
- Spyware
- Ransomware

A. A software/hardware that tracks every key pressed on a keyboard.
B. A software that replicates itself into every directory on a computer upon invasion.
C. A software that disguises itself as innocent software while running malicious scripts in the background.
D. A software that allows the hacker to bypass administrative restrictions.
E. A software that has a specific target.
F. A malware that triggers when a specific condition is met.
G. Software that collects unauthorized data by use of either cameras, microphone, or other peripherals.
H. Software that locks data files and demands a monetary payment in exchange for unlocking.

Answer :

Answer:

A. Keylogger: A software/hardware that tracks every key pressed on a keyboard.

B. Virus: A software that replicates itself into every directory on a computer upon invasion.

C. Trojan Horse: A software that disguises itself as an innocent software while running malicious scripts in the background.

D. Rootkit: A software that allows the hacker to bypass administrative restrictions.

E. Worm: A software that has a specific target.

F. Logic Bomb: A malware that triggers when a specific condition is met.

G. Spyware: Software that collects unauthorized data by use of either cameras, microphone, or other peripherals.

H. Ransomware: Software that locks data files and demands a monetary payment in exchange for unlocking.

Hope this helps!