nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #244

CERTIFIED-IN-CYBERSECURITY Question #244: Real Exam Question with Answer & Explanation

The correct answer is C: Ransomware. Ransomware is a type of malware that takes hostage a user's data and requires a ransom payment for release (see ISC2 Study Guide, Module 2, under Types of Threats). Trojans, DoS, and viruses are all other types of malware, but they do not typically require a ransom payment for re

Security Principles

Question

What type of malware is used to take hostage a user's data and require a ransom payment for release?

Options

  • ADoS
  • BVirus
  • CRansomware
  • DTrojan

Explanation

Ransomware is a type of malware that takes hostage a user's data and requires a ransom payment for release (see ISC2 Study Guide, Module 2, under Types of Threats). Trojans, DoS, and viruses are all other types of malware, but they do not typically require a ransom payment for release. Specifically Trojans, hide within legitimate software to create backdoors for other malware or viruses, replicating and modifying other programs to carry out their destructive actions, ransomware blocks access to a user's data until a ransom is paid. However, it's important to note that paying the ransom does not guarantee that the encrypted data will be successfully decrypted or returned. Ransomware differs from a Denial of Service (DoS) attack, which floods a network or server with traffic to make it unavailable, but doesn't typically involve data encryption or ransom demands

Topics

#Malware#Ransomware#Cyber threats#Cybersecurity terminology

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions