__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
A . Trojan
B . Operating System
C . Virus
D . Malware

Answer: D

Explanation:

Malware is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is a general term that covers various types of malicious software, such as viruses, worms, trojans, ransomware, spyware, adware, etc. Malware can cause serious damage to the organization’s information assets and reputation, and may lead to legal or regulatory consequences. Therefore, the organization should implement appropriate controls to prevent, detect and remove malware, as specified in ISO/IEC 27001:2022 clause 12.2.1.

Reference: [CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course], ISO/IEC 27001:2022 Information technology ― Security techniques ― Information security management systems ― Requirements, What is malware?

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments