__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
A . Trojan
B . Operating System
C . Virus
D . Malware
Answer: D
Explanation:
Malware is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is a general term that covers various types of malicious software, such as viruses, worms, trojans, ransomware, spyware, adware, etc. Malware can cause serious damage to the organization’s information assets and reputation, and may lead to legal or regulatory consequences. Therefore, the organization should implement appropriate controls to prevent, detect and remove malware, as specified in ISO/IEC 27001:2022 clause 12.2.1.
Reference: [CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course], ISO/IEC 27001:2022 Information technology ― Security techniques ― Information security management systems ― Requirements, What is malware?
Latest ISO-IEC-27001 Lead Auditor Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund