Question 16 (1 point) Which of the following best describes the difference between a virus and a worm? Question 16 options: A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself. A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself. A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file. There is no difference between a virus and a worm. Question 17 (1 point) Which of the following is an example of a malware prevention control? Question 17 options: Not allowing users to have administrative rights to their workstations User awareness to recognize and report suspicious activity Real-time firewall detection of suspicious file downloads Review and analysis of log files Question 18 (1 point) Which of the following statements about Trojans is true? Question 18 options: Trojans need user interaction to spread. Trojans are legitimate programs that enhance user experience. Trojans reproduce by infecting other files. Trojans self-replicate. Question 19 (1 point) Which of the following statements best describes data replication? Question 19 options: The process of copying data to a second location that is available for immediate use The process of copying and storing data that could be restored to its original location The process of copying data to another drive weekly The process of copying data to the cloud Question 20 (1 point) Which of the following statements about data backup is not true? Question 20 options: Backups do not have to be restored as long as they are stored in the cloud. Backups can be stored to a tape. Backups can be stored in the cloud. Backups can be conducted once a week. Question 21 (1 point) Which of the following statements about antivirus software is not true? Question 21 options: Antivirus software can detect, contain, or eliminate malware. Antivirus software can detect various types of malware. Antivirus software is 100 percent effective against malware intrusions. Antivirus software uses signature-based recognition and behavior-based recognition to detect malware. Question 22 (1 point) Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public? Question 22 options: Bot Screen scraper Ransomware Zero-day exploit Question 23 (1 point) Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out denial-of-service attacks? Question 23 options: Ransomware Screen scraper Zero-day exploit Bot Question 24 (1 point) Which of the following is an example of ransomware that takes a computer or its data hostage in an effort to extort money from victims? Question 24 options: WannaCry Slammer Sapphire S.