CYBERSECURITY HYGIENE — Infection vectors Which action below is a common way to get a computer virus or similar malware on a personal computer?

Difficulty: Easy

Correct Answer: Opening e-mail attachments

Explanation:


Introduction / Context:
Malware often relies on social engineering to trick users into running malicious code. E-mail remains a major attack vector because attachments can hide executable payloads or macro-enabled documents.



Given Data / Assumptions:

  • Typical home/office user behavior is considered.
  • Attachments may include executable files, macro-enabled Office documents, or compressed archives.
  • Modern mail systems scan for malware, but zero-day and social engineering still succeed.



Concept / Approach:
Malicious attachments or links inside e-mails can deliver trojans, ransomware, spyware, and worms. When a user opens or enables macros, the code runs with the user’s privileges, infecting the machine. Safe practices include verifying sender identity, scanning attachments, and disabling automatic macro execution.



Step-by-Step Solution:
Identify which listed action executes untrusted code → opening e-mail attachments.Recognize that merely “sending e-mail” does not infect your own PC.Other options (season, shopping online) are not causal without downloading or running unsafe files.



Verification / Alternative check:
Incident response data repeatedly shows phishing with malicious attachments as a leading initial infection vector; security awareness training targets this risk.



Why Other Options Are Wrong:
Sending e-mails — benign unless sending malware to others, which still requires execution to infect.Winter usage — weather does not install malware.Shopping online — generally safe over HTTPS unless you download/run malicious files; risk lies in downloads, not the act itself.



Common Pitfalls:
Trusting attachments from spoofed senders; enabling macros in “invoices” or “resumes.” Always preview, scan, and verify before opening files.



Final Answer:
Opening e-mail attachments

More Questions from Technology

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion