The correct answer is 'Exploits a vulnerability to replicate itself and spread to other systems without user intervention'. This accurately describes a computer worm, which is standalone malware that replicates and spreads across networks, often by exploiting software vulnerabilities, without requiring any human action to propagate.
'Resides in the system memory to intercept data and send it to a remote attacker' describes spyware. A keylogger is a specific type of spyware that records keystrokes, but the broader category involves monitoring user activity and exfiltrating data.
'Requires a host file to spread to other systems and remains dormant until certain conditions are met' combines the characteristics of a virus and a logic bomb. A virus needs a host file to attach to and requires user action to spread, while a logic bomb is code that remains dormant until specific conditions trigger its malicious payload.
'Encrypts files and demands a ransom for decryption without replicating to other systems' describes ransomware. Its primary function is to encrypt data and extort money from the victim. While some ransomware has worm-like capabilities for spreading (e.g., WannaCry), its defining purpose is encryption for ransom.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do worms exploit vulnerabilities to spread without user intervention?
Open an interactive chat with Bash
How do worms differ from viruses in their behavior and spread mechanisms?
Open an interactive chat with Bash
What are some famous examples of worms, and what impacts did they have?