Report Bug

Qus: <p>Match the cybersecurity threats with their descriptions.</p><p><br></p><table class="table table-bordered"><tbody><tr><td><b>Threat</b></td><td><b>Description</b></td></tr><tr><td>1<span style="white-space:pre"> </span>Phishing</td><td>A<span style="white-space:pre"> </span>A virus that encrypts files and demands payment</td></tr><tr><td>2<span style="white-space:pre"> </span>Ransomware</td><td>B<span style="white-space:pre"> </span>A fake email designed to steal login information</td></tr><tr><td>3<span style="white-space:pre"> </span>Trojan Horse</td><td>C<span style="white-space:pre"> </span>A harmful program disguised as a useful software</td></tr><tr><td>4<span style="white-space:pre"> </span>Spyware</td><td>D<span style="white-space:pre"> </span>Secretly records user activities and sends them to attackers</td></tr><tr><td><br></td><td>E<span style="white-space:pre"> </span>Disrupts or overloads a website with traffic</td></tr><tr><td><br></td><td>F<span style="white-space:pre"> </span>Exploits software vulnerabilities before a patch is available</td></tr></tbody></table><p><br></p>

Qusसाइबर सुरक्षा खतरों का उनके विवरण से मिलान करें।


A. 1 → A, 2 → D, 3 → B, 4 → C
B. 1 → B, 2 → A, 3 → C, 4 → D
C. 1 → C, 2 → A, 3 → D, 4 → B
D. 1 → E, 2 → F, 3 → B, 4 → A


Solution
B. 1 → B, 2 → A, 3 → C, 4 → D