Malware: Keeping your company safe inside Quiz

1. What is a common method used by extortion schemes in cybersecurity?

2. Which type of malware is known for spreading itself through networks without human interaction?

3. What is the primary goal of a Trojan malware?

4. Which type of malware is often used for deceitful marketing purposes?

5. What makes rootkits particularly dangerous compared to other types of malware?