Which of the following is NOT a way that malicious code can spread?

Which of the following is NOT a way that malicious code can spread?

A. Running a virus scan

B. E-mail attachments

C. Visiting infected websites

D. Downloading files

Answer – A. Running a virus scan.

Malicious codes are also called malware and these are considered to be the types of computer programming-related software or scripts which are developed for harming, exploiting or compromising the computer networks or systems. The codes are mainly used for causing the unwanted changes, ongoing access towards the computer systems or the damages which further result in the security breaches and the back doors. The data theft and information theft issues can also occur due to the malicious codes within the computer systems. Malicious codes can include the worms, Trojans, viruses, spyware and the adware. The delivery of the malicious codes can be based on different methods that include animated and e-mail greeting cards. The codes can also spread through the different online networks, wireless connectivity, direct device-based interfaces and wireless connectivity. Malicious codes can be avoided by practicing the appropriate habits of cybersecurity that include taking the online precautions related to sensitive information and updating the security software on a regular basis. The usage of an antivirus software is another activity that can performed for avoiding the malicious codes. The reason behind rejection of the option “B. E-mail attachments” is that the e-mail attachments can play an important role in transferring the malicious codes within the computer systems. The option “C. Visiting infected websites” was rejected as the activity related to going to the infected websites can be a huge issue that can lead to malicious codes entering the computer systems. The entry of malicious codes in the computer systems plays an important role in infecting them. The rejection of option “D. Downloading files” was based on the significance of this activity on malicious codes entering the computer systems of the individuals.


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *