nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #456

CERTIFIED-IN-CYBERSECURITY Question #456: Real Exam Question with Answer & Explanation

The correct answer is C: Automatically installed through phishing emails or by visiting an infected website. Ransomware typically enters a system through phishing emails or by visiting an infected Web site (see the ISC2 Study Guide, Chapter 4, Module 2). For example, a user may receive an email that appears to be from a trusted source, such as their bank. The email contains a link or at

Security Operations

Question

How does ransomware typically enter a system?

Options

  • AAutomatically installed through software updates from trusted sources
  • BManually installed by the user without knowledge of its harmful nature
  • CAutomatically installed through phishing emails or by visiting an infected website
  • DBy damaging the computer's hardware components

Explanation

Ransomware typically enters a system through phishing emails or by visiting an infected Web site (see the ISC2 Study Guide, Chapter 4, Module 2). For example, a user may receive an email that appears to be from a trusted source, such as their bank. The email contains a link or attachment that, when clicked or opened, installs the ransomware on the user's system. The remaining options do not accurately describe how ransomware typically enters a system. While it's possible for a user to manually install ransomware without realizing its harmful nature, this is not the most common method of infection. Ransomware is not typically installed through software updates from trusted sources. While it's theoretically possible for a trusted source to be compromised and used to distribute ransomware, this is not a common occurrence and security measures are in place to prevent this type of attack. Finally, ransomware does not damage the hardware components of a computer

Topics

#Ransomware#Threat Vectors#Phishing#Malware Delivery

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions